home.social

#amos — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #amos, aggregated by home.social.

  1. Poisoning the well: AI supply chain attacks on Hugging Face and OpenClaw

    Threat actors are actively exploiting AI distribution platforms like Hugging Face and ClawHub to deliver malware by embedding malicious code within models, datasets, and agent extensions. Over 575 malicious skills across 13 developer accounts were identified in the OpenClaw ecosystem, targeting Windows and macOS with trojans, cryptominers, and AMOS stealer. Attackers abuse trust relationships between users and AI platforms through indirect prompt injection, where hidden instructions cause AI agents to execute malicious actions on behalf of users. Trojanized skills masquerade as legitimate tools while instructing users to execute encoded commands or install hidden malicious dependencies. On Hugging Face, repositories host payloads within multistep infection chains disguised as legitimate applications. These campaigns employ social engineering, obfuscation, encryption, in-memory execution, process injection, and persistence techniques to evade detection while establishing covert command-and-control communica...

    Pulse ID: 6a01c2363e7f67fcbed473cb
    Pulse Link: otx.alienvault.com/pulse/6a01c
    Pulse Author: AlienVault
    Created: 2026-05-11 11:49:10

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #CryptoMiner #CyberSecurity #Encryption #HuggingFace #InfoSec #Mac #MacOS #Malware #OTX #OpenThreatExchange #Rust #SocialEngineering #SupplyChain #Trojan #Windows #bot #AlienVault

  2. Microsoft researchers warn of a new #ClickFix campaign targeting macOS with fake guides on Medium and Craft to deploy AMOS and SHub Stealer via Terminal commands.

    Read: hackread.com/fake-macos-troubl

    #CyberSecurity #macOS ##AMOS #SHubStealer #Scam

  3. ClickFix campaign uses fake macOS utilities lures to deliver infostealers

    Threat actors are leveraging ClickFix-style social engineering tactics to distribute infostealers targeting macOS users through fake system utility lures. Attackers host malicious Terminal commands on blog sites and content platforms, disguised as troubleshooting advice for macOS issues. When executed, these commands download infostealers including Macsync, Shub Stealer, and AMOS, which exfiltrate browser credentials, cryptocurrency wallets, iCloud data, Keychain entries, and media files. The campaign has evolved to use Terminal-based script execution that bypasses Gatekeeper verification. Three distinct campaigns employ different tradecraft, with some replacing legitimate cryptocurrency wallet applications with trojanized versions and establishing persistence through LaunchAgents and LaunchDaemons that masquerade as legitimate services.

    Pulse ID: 69fb97e43f09a3b9ae3a39b9
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:00

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #Cloud #CyberSecurity #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #RAT #ScriptExecution #SocialEngineering #Trojan #bot #cryptocurrency #AlienVault

  4. ClickFix campaign uses fake macOS utilities lures to deliver infostealers

    Threat actors are leveraging ClickFix-style social engineering tactics to distribute infostealers targeting macOS users through fake system utility lures. Attackers host malicious Terminal commands on blog sites and content platforms, disguised as troubleshooting advice for macOS issues. When executed, these commands download infostealers including Macsync, Shub Stealer, and AMOS, which exfiltrate browser credentials, cryptocurrency wallets, iCloud data, Keychain entries, and media files. The campaign has evolved to use Terminal-based script execution that bypasses Gatekeeper verification. Three distinct campaigns employ different tradecraft, with some replacing legitimate cryptocurrency wallet applications with trojanized versions and establishing persistence through LaunchAgents and LaunchDaemons that masquerade as legitimate services.

    Pulse ID: 69fb97e43f09a3b9ae3a39b9
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:00

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #Cloud #CyberSecurity #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #RAT #ScriptExecution #SocialEngineering #Trojan #bot #cryptocurrency #AlienVault

  5. ClickFix campaign uses fake macOS utilities lures to deliver infostealers

    Threat actors are leveraging ClickFix-style social engineering tactics to distribute infostealers targeting macOS users through fake system utility lures. Attackers host malicious Terminal commands on blog sites and content platforms, disguised as troubleshooting advice for macOS issues. When executed, these commands download infostealers including Macsync, Shub Stealer, and AMOS, which exfiltrate browser credentials, cryptocurrency wallets, iCloud data, Keychain entries, and media files. The campaign has evolved to use Terminal-based script execution that bypasses Gatekeeper verification. Three distinct campaigns employ different tradecraft, with some replacing legitimate cryptocurrency wallet applications with trojanized versions and establishing persistence through LaunchAgents and LaunchDaemons that masquerade as legitimate services.

    Pulse ID: 69fb97e43f09a3b9ae3a39b9
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:00

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #Cloud #CyberSecurity #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #RAT #ScriptExecution #SocialEngineering #Trojan #bot #cryptocurrency #AlienVault

  6. ClickFix campaign uses fake macOS utilities lures to deliver infostealers

    Threat actors are leveraging ClickFix-style social engineering tactics to distribute infostealers targeting macOS users through fake system utility lures. Attackers host malicious Terminal commands on blog sites and content platforms, disguised as troubleshooting advice for macOS issues. When executed, these commands download infostealers including Macsync, Shub Stealer, and AMOS, which exfiltrate browser credentials, cryptocurrency wallets, iCloud data, Keychain entries, and media files. The campaign has evolved to use Terminal-based script execution that bypasses Gatekeeper verification. Three distinct campaigns employ different tradecraft, with some replacing legitimate cryptocurrency wallet applications with trojanized versions and establishing persistence through LaunchAgents and LaunchDaemons that masquerade as legitimate services.

    Pulse ID: 69fb97e43f09a3b9ae3a39b9
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:00

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #Cloud #CyberSecurity #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #RAT #ScriptExecution #SocialEngineering #Trojan #bot #cryptocurrency #AlienVault

  7. ClickFix campaign uses fake macOS utilities lures to deliver infostealers

    Threat actors are leveraging ClickFix-style social engineering tactics to distribute infostealers targeting macOS users through fake system utility lures. Attackers host malicious Terminal commands on blog sites and content platforms, disguised as troubleshooting advice for macOS issues. When executed, these commands download infostealers including Macsync, Shub Stealer, and AMOS, which exfiltrate browser credentials, cryptocurrency wallets, iCloud data, Keychain entries, and media files. The campaign has evolved to use Terminal-based script execution that bypasses Gatekeeper verification. Three distinct campaigns employ different tradecraft, with some replacing legitimate cryptocurrency wallet applications with trojanized versions and establishing persistence through LaunchAgents and LaunchDaemons that masquerade as legitimate services.

    Pulse ID: 69fb97e43f09a3b9ae3a39b9
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:00

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #Cloud #CyberSecurity #ICS #InfoSec #InfoStealer #Mac #MacOS #OTX #OpenThreatExchange #RAT #ScriptExecution #SocialEngineering #Trojan #bot #cryptocurrency #AlienVault

  8. AMOS Stealer delivered via Cursor AI agent session

    Pulse ID: 69f19249610906a8b5470a4b
    Pulse Link: otx.alienvault.com/pulse/69f19
    Pulse Author: Tr1sa111
    Created: 2026-04-29 05:08:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #CyberSecurity #InfoSec #OTX #OpenThreatExchange #bot #Tr1sa111

  9. Video-Tutorial: AMOS hardware sprites & colour palette management
    In his latest AMOS video, @yawning_angel explores hardware sprites and demonstrates how to display 32 colours on a 16-colour screen using a hardware sprite.

    amiga-news.de/en/news/AN-2026-

  10. AMOS Stealer delivered via Cursor AI agent session

    On April 23, 2026, Field Effect MDR identified AMOS Stealer malware delivered through a novel technique exploiting Cursor AI agent sessions running Claude Code. The attack employed social engineering to manipulate operators into prompting the AI agent to download and execute malicious AppleScript loaders. The heavily obfuscated scripts performed sandbox evasion checks, collected sensitive data including credentials, SSH keys, browser data, and cryptocurrency wallets, then exfiltrated compressed archives to remote servers within two minutes. The malware prompted users for local account credentials through fake macOS system dialogs, subsequently using elevated permissions to install persistent implants masquerading as legitimate system services. This delivery mechanism makes detection challenging as malicious commands blend with typical agentic coding behavior, representing an evolution in AMOS Stealer tactics beyond traditional SEO poisoning methods.

    Pulse ID: 69ec44ff58f20f2cb01e0a1c
    Pulse Link: otx.alienvault.com/pulse/69ec4
    Pulse Author: AlienVault
    Created: 2026-04-25 04:37:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AMOS #Browser #CyberSecurity #ICS #InfoSec #Mac #MacOS #Malware #OTX #OpenThreatExchange #RAT #SEOPoisoning #SSH #SocialEngineering #bot #cryptocurrency #AlienVault

  11. A new AMOS video, and I’m *finally* looking at Hardware Sprites! 😅
Starting off with looking at getting the colours right and 32 colours on a 16 colour screen.
    More AMOS witchcraft. 😱


    Look out for some famous faces (and voices) in this one. 😎



    youtu.be/gVE8qD13DDQ



    #amiga #amos

  12. I am behind on my next AMOS PRO video, but I *hope* to start filming this week with a w/c 20th release. 🤞
    (The code has been created... 😱)

    #amiga #amos

  13. One week on, Issue 1 of the "Adventures In Retro" disk mag has had over 800 downloads, and, a positive review in WhatIFF? Magazine ............... see the attached screenshot or check out WhatIFF? Magazine yourself here: whatiff.info/

    #amiga #amigaaddict #diskmag #amos #amigaformat #cuamiga #whatiff

  14. WOW! I can't believe it! It's not quite been a week and there's been 775 downloads of Issue 1 of my diskmag "Adventures In Retro" from Aminet - I've not got stats for this enabled on the website so not sure how many have downloaded from there.

    A massive thank you from all that have downloaded, read, and enjoyed my ramblings, I will be back with more soon.

    A huge thank you to all my supporters and contributors too - you know who you are 👍

    #amiga #diskmag #amigaaddict #amos

  15. Here it is, as mentioned earlier today, I've pulled the trigger and uploaded "Issue 1" of my new Disk Mag "Adventures In Retro"

    Before I drop the URL, I'd like to use this opportunity to thank @MsMadLemon for the support and assistance in getting this project off the ground (as well as the other contributors I have)

    You can download this from here:
    adv-in-retro.uk/

    #amiga #diskmag #amigaaddict #amos #retrocomputing

  16. Sound tool: FxBox 1.20

    FxBox, a real-time multi-loop processor and editor written in AMOS, is now available in version 1.20; details on the numerous new features can be found in the release notes.

    amiga-news.de/en/news/AN-2026-

  17. Back to AMOS for this video, and looking at getting more than 8 colours on screen for Dual Playfields.

    A bit of a hack, but common sense when you know how. 😅

    Does this make game coding easier? 🤔 Check out the video and see for yourself. 😎

    youtu.be/u1OJCKnjx18

    #amiga #amos #retrocomputing

  18. #TheGate for #Amiga
    ---
    I've been thinking for a while about how to implement a kind of simulated DOS, I'd like to let players mess around with crashed terminals, read hidden documents and do hacker stuff, maybe today I got a good idea on how to simulate all of this without blowing up AMOS Pro 😃
    For now it's all on paper, I'll do some tests but I really think it's feasible. :amiga: 😍
    ---
    #indiedev #retrogaming #gamedev #AMOSprofessional #AMOS

  19. Video:
    @RobSmithDev and @yawning_angel have interviewed the French programmer François Lionet, who wrote STOS BASIC for the Atari ST and AMOS BASIC for the Amiga.

    amiga-news.de/en/news/AN-2026-

  20. @yawning_angel @RobSmithDev Thanks for the excellent video, François is such a great personality!

    Spent quite a few nights and weekends with the marvels that were #AMOS and AMOS Pro, as well as gems like #OctaMED and #DeluxePaint. Good times!

  21. I was incredibly humbled to be invited to take part in this by @RobSmithDev

    Interviewing the amazing AMOS creator Francois Lionet was an incredible experience.

    youtu.be/JhEY5pqe5SQ?si=FaJJpz

    #amos #retrocomputing #amiga #atarist

  22. Sunday afternoon coding... and next video planning... 🤔😁

    #amiga #amos #retrocomputing

  23. I'm evaluating to replace some time-critic AMOS routines with assembler, I've made a very simple test to check if it really works.
    Ok, it's just an RTS but I wanted to test it😃
    One part I'd like to replace is the calculation to check whether the player is within the enemy's detection range or not.

    I may gain some cycles to allow expanded A500 to run the game smoothly.

    ❌ Bad idea?
    ✅ Good idea?
    :amiga: 😁
    ---
    #TheGate #AMOS #IndieDev #Assembly #Amiga #asmone #retroprogramming #asm

  24. A new AMOS video from me, and I’m compiling, after installing the AMOS Pro Compiler that is!😅


    In this video I share my install process and experience of the AMOS Pro Compiler. 😎

    youtu.be/RbWx0cbd134

    #amiga #amos #retrocomputing

  25. #TheGate for #Amiga
    ---
    What's obvious to me isn't necessarily obvious to everyone, so I added a little helper to the menus. :amiga:
    ---
    #indiedev #retrodev #amos #amosprofessional

  26. The real-time multi-loop processor and editor FxBox, written in AMOS, is now available in version 1.19.

    amiga-news.de/en/news/AN-2026-

  27. "Project Horizon" by Electric Black Sheep is a tactical shooter in the style of Chaos Engine or Alien Breed. The title, developed with Amos, requires 2 megabytes of chip RAM. The HD version, which is over 100 MB in size:

    amiga-news.de/en/news/AN-2026-

  28. [related]
    Encore un enchaînement malveillant repéré par Howard Oakley cette fois avec Medium pour crédibiliser la démarche

    Même recette, nouveau chemin d’infection :
    👉 Résultat Google (sponsorisé)
    👉 article Medium “empoisonné” pour crédibiliser la démarche
    👉 faux conseil “Apple Support-like”
    👉 invitation à coller une commande obfusquée dans Terminal
    👉 téléchargement et exécution d’un AMOS/SOMA Stealer

    Même TTP que la campagne précédente liée à ChatGPT :

    • obfuscation base64 quasi identique

    • usage de curl (pas de quarantaine xattr)

    • exécution via signature ad hoc

    • exfiltration immédiate du dossier Documents vers “FileGrabber”

    *création de fichiers cachés dans ~ :

    -.agent (AppleScript de persistance)

    • .mainHelper (binaire Mach-O principal)

    • .pass (mot de passe en clair 😬)

    • demande d’accès à Notes

    "More malware from Google search"
    👇
    eclecticlight.co/2026/01/30/mo

    #CyberVeille #MacOS #AMOS #clickfix

  29. A new AMOS video from me, this time all about trapping pesky errors in your code. Yep, it's all about error handling. 😁

    #amiga #amos #retrocomputing

    youtu.be/N306iywd9kQ

  30. Fałszywe strony Malwarbytes, Lastpass i nie tylko na GitHubie

    Malwarebytes ostrzega użytkowników Maców przed szeroko zakrojoną kampanią dystrybucji złośliwego oprogramowania za pośrednictwem fałszywych stron GitHub.  Celem cyberprzestępców jest skłonienie użytkowników do samodzielnej instalacji malware Atomic Stealer (znanego jako AMOS), który kradnie dane.  Cyberzbóje używają sponsorowanych reklam Google lub optymalizacji SEO, tak aby ich strony wyświetlały się na początku wyników...

    #WBiegu #Amos #Awareness #Infostealer #Lastpass #Malwarebytes

    sekurak.pl/falszywe-strony-mal

  31. At the end of August, Keith 'Yawning Angel' Elcombe showed in a video how he recreated the arcade game "Space Race" in AMOS. In his new video, he now begins work on version 2 and uses the "AMOS Animation Language" (AMAL) for the graphic animation.

    amiga-news.de/en/news/AN-2025-

    #AMOS #AMAL #Amiga #video #retrogaming

  32. At the end of August, Keith 'Yawning Angel' Elcombe showed in a video how he recreated the arcade game "Space Race" in AMOS. In his new video, he now begins work on version 2 and uses the "AMOS Animation Language" (AMAL) for the graphic animation.

    amiga-news.de/en/news/AN-2025-

  33. At the end of August, Keith 'Yawning Angel' Elcombe showed in a video how he recreated the arcade game "Space Race" in AMOS. In his new video, he now begins work on version 2 and uses the "AMOS Animation Language" (AMAL) for the graphic animation.

    amiga-news.de/en/news/AN-2025-

    #AMOS #AMAL #Amiga #video #retrogaming

  34. At the end of August, Keith 'Yawning Angel' Elcombe showed in a video how he recreated the arcade game "Space Race" in AMOS. In his new video, he now begins work on version 2 and uses the "AMOS Animation Language" (AMAL) for the graphic animation.

    amiga-news.de/en/news/AN-2025-

    #AMOS #AMAL #Amiga #video #retrogaming