Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data


A sophisticated phishing campaign targeting macOS users has emerged, using fake compliance emails as a delivery mechanism for advanced malware.

Chainbase Lab recently detected this campaign, which impersonates legitimate audit and compliance notifications to deceive users.

The attack chain combines social engineering with multi-stage fileless payloads designed to steal credentials and establish persistent remote access on victim machines.

Attackers start by requesting users confirm their company’s legal name, then follow up with messages claiming to be from financial auditors or token vesting administrators, complete with malicious attachments.

The attack unfolds through carefully orchestrated steps that trick users into opening weaponized documents. Initial emails ask recipients to provide basic company information, establishing trust before the second wave arrives.

When victims respond, attackers send follow-up messages with subject lines referencing “FY2025 External Audit” or “Token Vesting Confirmation” deadlines.

google

These messages contain attachments disguised as Word or PDF files, but are actually AppleScript files using double extensions to hide their true nature.

SlowMist analysts identified that the malware employs a multi-stage infection process, with the initial AppleScript file serving as the entry point for downloading and executing additional malicious code.

SlowMist researchers noted the malware’s primary infection vector uses a file named “Confirmation_Token_Vesting.docx.scpt,” which appears legitimate but executes as a script.

The first-stage AppleScript opens fake system settings windows showing software update progress bars to distract users while running malicious code in the background.

AppleScript file (Source - Medium)
AppleScript file (Source – Medium)

The script collects system information including CPU architecture and macOS version, then downloads additional payloads from the suspicious domain sevrrhst[.]com.

Deception Evasion Through Fake System Prompts

The malware’s detection evasion relies heavily on displaying convincing system permission dialogs that impersonate macOS security alerts.

index.js (Source - Medium)
index.js (Source – Medium)

These fake prompts incorporate Google avatar elements to appear legitimate, tricking users into entering their administrator passwords.

Once a password is entered, the script validates it against the system and immediately exfiltrates the credentials to the remote server using Base64 encoding.

Domain sevrrhst[.]com analysis (Source - Medium)
Domain sevrrhst[.]com analysis (Source – Medium)

Beyond credential theft, the malware attempts to bypass macOS TCC protections by injecting SQL statements directly into the privacy database, silently granting itself camera access, screen recording permissions, and keyboard monitoring capabilities.

This persistence mechanism allows the attacker to maintain long-term access and execute arbitrary commands through a Node.js runtime environment established on the compromised machine.

The infrastructure supporting this campaign uses throwaway domains registered in late January 2026, with the command server at sevrrhst[.]com resolving to IP 88.119.171.59, which hosts over ten similar malicious domains used for infrastructure reuse.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link