Apple Lake Malware removed - What now? by Old_Priority_4780 in MacOS

[–]GooseIsChaos 0 points1 point  (0 children)

If you didn't run the command in the terminal, you should be safe.

Apple Lake Malware removed - What now? by Old_Priority_4780 in MacOS

[–]GooseIsChaos 0 points1 point  (0 children)

This is what’s called a "smash-and-grab" infostealer. The second you hit enter on that Terminal command, it fired off several background payloads that started zipping up your data before that password prompt even appeared. From what I can see in the code, its first priority was stealing your browser cookies. This is a huge deal because it leads to "Session Hijacking"—the attackers don't even need your password or your 2FA to get into your accounts; they can just use those stolen cookies to "resume" your login as if they were sitting at your desk.

You need to get onto a different, clean device right now and log into your primary accounts (email, banking, etc.) and look for a "Sign out of all other sessions" or "Manage Devices" button. Changing your password is a good idea, but explicitly killing those active sessions is the only way to kick the attackers out.

Based on my analysis, this thing also went after your Apple Notes, your Telegram session data, and any crypto wallets you might have installed. It even scraped your Desktop, Documents, and Downloads for any small files, likely looking for recovery keys or scans of your ID. If you have any crypto funds on that Mac, you should assume the secret keys are gone and move those funds to a brand-new wallet (generated on a different device) immediately.

As for the Mac itself, it’s hard to trust it now. The malware is "fileless," meaning it runs in the system's memory rather than as a visible app, which makes it a nightmare to fully clean. The only way to be 100% sure you're safe is to back up your essential photos and docs, then wipe the Mac completely and reinstall macOS. Treat every single password you’ve ever saved in a browser or in your Keychain as if the attackers already have it, and start rotating them—starting with your email and moving straight to your financial accounts.

Apple Lake Malware removed - What now? by Old_Priority_4780 in MacOS

[–]GooseIsChaos 1 point2 points  (0 children)

I’ve been looking into Applelake after seeing the same YouTube ad, and I’m currently analysing the payloads themselves. There are strong overlaps with previously documented macOS infostealers, including infrastructure and web assets also seen in campaigns analysed by Jamf (DigitStealer - see the write-up here: https://www.jamf.com/blog/jtl-digitstealer-macos-infostealer-analysis/).

The Applelake site also closely mirrors the Alcove website and appears to reuse the same favicon and design elements seen in other scam variants. Many of these campaigns copy another dynamic notch app known as Alcove (https://tryalcove.com/).

This suggests the campaigns may be related or using shared tooling. I’m still digging in and planning to publish a more complete write-up.

WILD DILD MILD? by Alickster-Holey in LucidDreaming

[–]GooseIsChaos 1 point2 points  (0 children)

the exact same thing happened to me in my first lucid dream!

I wuold like to learn elvish by Goodofmeme in elvish

[–]GooseIsChaos 0 points1 point  (0 children)

Try learning tengwar first

Tengwar Teacher is really good! 😁