{"id":1768,"date":"2025-12-11T11:00:23","date_gmt":"2025-12-11T12:00:23","guid":{"rendered":"http:\/\/stonegatepress.com\/?p=1768"},"modified":"2025-12-12T13:15:11","modified_gmt":"2025-12-12T13:15:11","slug":"attackers-using-chatgpt-to-trick-mac-users-into-installing-macstealer","status":"publish","type":"post","link":"http:\/\/stonegatepress.com\/index.php\/2025\/12\/11\/attackers-using-chatgpt-to-trick-mac-users-into-installing-macstealer\/","title":{"rendered":"Attackers using ChatGPT to trick Mac users into installing MacStealer"},"content":{"rendered":"<div class=\"feat-image\"><img src=\"http:\/\/stonegatepress.com\/wp-content\/uploads\/2025\/12\/Attacker-used-ChatGPT-to-trick-Mac-users-into-installing-MacStealer.jpg\" \/><\/div>\n<p><a href=\"https:\/\/9to5mac.com\/guides\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security<\/a> researchers have found that attackers are using <a href=\"https:\/\/9to5mac.com\/guides\/chatgpt\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT<\/a> to trick <a href=\"https:\/\/9to5mac.com\/guides\/mac\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mac<\/a> users into pasting a command line into Terminal which installs malware. Specifically, it installs <a href=\"https:\/\/9to5mac.com\/2023\/03\/28\/macstealer-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">MacStealer<\/a>, which allows the attacker to obtain iCloud passwords, files, and credit card details.<\/p>\n<p>The attack targeted people who were searching Google for instructions on how to free up some disk space on a Mac \u2026<\/p>\n<p> <a data-layer-pagetype=\"post\" data-layer-postcategory=\"chatgpt,mac,security\" data-layer-viewtype=\"taxonomy-ninetofive_guides\" data-post-id=\"1032107\" href=\"https:\/\/9to5mac.com\/2025\/12\/11\/attackers-using-chatgpt-to-trick-mac-users-into-installing-macstealer\/#more-1032107\" class=\"more-link\">more\u2026<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have found that attackers are using ChatGPT to trick Mac users into pasting a command line ...<\/p>","protected":false},"author":1,"featured_media":1770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/posts\/1768"}],"collection":[{"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/comments?post=1768"}],"version-history":[{"count":2,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/posts\/1768\/revisions"}],"predecessor-version":[{"id":1771,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/posts\/1768\/revisions\/1771"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/media\/1770"}],"wp:attachment":[{"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/media?parent=1768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/categories?post=1768"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/stonegatepress.com\/index.php\/wp-json\/wp\/v2\/tags?post=1768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}