2025-11-27

Legit tools + simple primitives are weaponized everywhere

Level: 
Strategic
  |  Source: 
Healthcare
Finance
Government
Telecommunications
Technology
Share:

Legit tools + simple primitives are weaponized everywhere

Blind execution represents a critical evasion technique where victims unknowingly execute malicious code without any opportunity to review it. Attackers leverage this in multiple scenarios:

  1. Social engineering: "Just run this one command to fix your issue."
  2. Fake software installers mimicking legitimate tools (Docker or Homebrew)
  3. Post-exploitation C2 communications downloading additional tools
  4. Supply chain attacks delivering staged malware

This attack vector is devastatingly effective because:

  • Users trust terminal commands - Especially when presented as "fixes" from seemingly legitimate sources
  • Security tools can't inspect - Command execution happens in trusted contexts (Terminal.app, iTerm2)
  • No file drops required - Fileless execution via curl pipe to shell leaves minimal forensic traces
  • Bypasses Gatekeeper - Commands executed directly in Terminal bypass macOS code-signing checks

Observed Patterns:

We can't straight-up block curl or bash, but we can recognize risky compositions like:

  • Script Editor, Terminal, iTerm2, Mono / .NET runtimes
  • curl, wget, bash, zsh, chmod +x, xattr /tmp paths.
  • LaunchAgents created npm/node from browser-originated files or unusual users.

Detections (for Anvilogic customers):

Real-World Usage:

  • ClickFix Campaigns (2024-2025): 517% increase in H1 2025 (ESET), becoming #2 attack vector after phishing, accounting for 8% of all blocked attacks. Fake CAPTCHA/verification pages instruct users to paste malicious commands into Terminal (macOS) or PowerShell (Windows). Campaigns targeting:
    • Spectrum telecom impersonation delivering Atomic macOS Stealer (AMOS)
    • Google Meet fake conference pages
    • Fake Cloudflare CAPTCHA verifications
    • TradingView financial platform spoofs
    • Odyssey Stealer deployment via tradingviewen[.]com

Get trending threats published weekly by the Anvilogic team.

Sign Up Now