Signal
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-03-16 06:30 UTCUpdated 2026-03-16 22:56 UTC
rss
malwarebytes_threat_analysis
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (4 domains)domains are deduped. counts indicate coverage, not truth.4 top sources shown
Overview
Cybercriminals are combining compromised websites with increasingly sophisticated ClickFix social engineering lures to deliver new infostealer malware, with one campaign alone weaponizing more than 250 WordPress sites across 12 countries.
Score total
1.29
Momentum 24h
4
Posts
4
Origins
4
Source types
1
Duplicate ratio
0%
All evidence
All evidence
New ClickFix attack leverages WorkFlowy for stealthy malware delivery
SC Media · scworld.com · 2026-03-16 22:56 UTC
Hacked sites deliver Vidar infostealer to Windows users
Malwarebytes Threat Analysis · malwarebytes.com · 2026-03-16 17:15 UTC
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
The Hacker News · thehackernews.com · 2026-03-16 11:41 UTC
ClickFix techniques evolve in new infostealer campaigns
CSO Online · csoonline.com · 2026-03-16 06:30 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 4Origin domains: 4Duplicates: -
Showing 4 / 0
Top publishers (this list)
- SC Media (1)
- Malwarebytes Threat Analysis (1)
- The Hacker News (1)
- CSO Online (1)
Top origin domains (this list)
- scworld.com (1)
- malwarebytes.com (1)
- thehackernews.com (1)
- csoonline.com (1)