- Cyber Syrup
- Posts
- Fake GitHub Repositories Target macOS Users with Infostealer Malware
Fake GitHub Repositories Target macOS Users with Infostealer Malware
Cybersecurity researchers have uncovered a widespread campaign in which threat actors are impersonating well-known brands to infect macOS users with information-stealing malware

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Buying Cannabis Online Is Now Legal, And Incredibly Convenient
For years, buying cannabis meant taking a trip to a dispensary, dealing with long lines, limited selection, and inconsistent pricing. But thanks to changing laws and innovative online retailers, buying high-quality THC products is now 100% federally legal—and more convenient than ever.
And when it comes to quality and reliability, Mood is leading the way…
Because they’ve completely flipped the script on cannabis shopping. Instead of memorizing hundreds of confusing strain names – like “Gorilla Glue” and "Purple Monkey Breath" – you simply choose how you want to feel: Creative, Social, Focused, Relaxed, Happy, Aroused, and more.
Each gummy is formulated with the perfect blend of Delta-9 THC and botanicals to deliver the perfect mood.
Want a great night’s sleep? Try the Sleepytime gummies. Need laser focus Mind Magic gummies have you covered. Hotter sex? Try the Sexual Euphoria gummies.
It's cannabis shopping that actually makes sense for “normal” people.
Fake GitHub Repositories Target macOS Users with Infostealer Malware

Cybersecurity researchers have uncovered a widespread campaign in which threat actors are impersonating well-known brands to infect macOS users with information-stealing malware. The campaign, flagged by LastPass, highlights how attackers are abusing trusted platforms like GitHub and search engines to distribute malicious software.
Attack Methodology
The attack begins with fraudulent GitHub repositories that appear in search results due to search engine optimization (SEO) techniques. These repositories claim to provide legitimate macOS applications from trusted companies.
In reality, the links redirect users to malicious websites. In LastPass’s case, two fraudulent repositories impersonated the company, with names such as “LastPass on MacBook” and “LastPass Premium on MacBook.” These were created by a user under the alias modhopmduck476 on September 16, 2025.
Instead of downloading a legitimate program, victims were redirected to macprograms-pro[.]com, where they were instructed to paste a command into their terminal. This command triggered a CURL request that downloaded a malicious payload into the Temp directory.
The Malware: Atomic macOS Stealer (AMOS)
The payload turned out to be Atomic macOS Stealer (AMOS), a well-known information-stealing malware that has been active since 2023. AMOS specializes in stealing:
Passwords and credentials
Browser autofill data
Cryptocurrency wallet information
Payment details
In August 2025, CrowdStrike warned about a new variant called SHAMOS, which further increased the malware’s reach through fraudulent ads.
Broader Targeting Strategy
LastPass noted that attackers are not just targeting its brand. They have been impersonating a wide range of organizations, including:
Financial institutions
Password managers
Technology companies
AI tools
Cryptocurrency wallets
By using multiple GitHub accounts with similar naming patterns, the attackers increase their chances of luring unsuspecting victims.
Historical Context
This campaign appears to be part of a broader strategy that has been ongoing since at least July 2025. Earlier, Deriv security researcher Dhiraj Mishra observed that Homebrew users were targeted through malicious ads leading to fake GitHub repositories.
These attacks exploit users’ trust in Google Ads and GitHub, often bundling the legitimate software installer with a hidden malicious payload that runs silently in the background.
Key Takeaways
macOS users are being actively targeted, despite perceptions that the platform is more secure.
Trusted platforms like GitHub and Google Ads can be abused, making vigilance essential.
AMOS remains a serious threat, capable of stealing financial and personal data with minimal user interaction.
Defensive Measures
Users are encouraged to:
Only download software from official vendor websites.
Avoid running commands copied from unverified sources.
Monitor GitHub repositories for authenticity.
Keep macOS security patches and antivirus solutions up to date.