More Mac malware from Google search
macOS permissions and Terminal access
- Several comments discuss macOS Full Disk Access and Terminal.
- Some find it confusing or overly restrictive (e.g. accidentally denying access can break their workflow and feels like “one straw too many”).
- Others argue it’s straightforward and beneficial: strong per‑app permissions are a net security gain, and changing them is simple in Settings.
- Debate on whether giving Terminal full access is “necessary”: some only need limited access (e.g. Homebrew in
/opt) while others consider Terminal pointless without full filesystem reach.
Web vs native apps and browser file APIs
- One view: the web should be the safer platform for tools like disk analyzers, but browser policies block useful access (e.g. to
~/Applications), making web-based tools impractical. - Counterpoint: letting a web app access the home directory is inherently dangerous; limited directories or containers/chroots are safer.
macOS vs Windows security and AV
- Discussion contrasts macOS sandboxing/Mandatory Access Controls and prompts with Windows’ NTFS ACLs and integrity levels.
- macOS: prompts for access to Documents/Desktop etc. even within a single user.
- Windows: can approximate this with things like “controlled folders” and Defender, but they’re off by default.
- Some say third‑party AV on macOS is unnecessary if you’re reasonably careful; others call Apple’s XProtect weak and point to enterprise endpoint tools that inspect exec/fork and block reverse shells, infostealers, etc.
- Disagreement over whether AV would have actually stopped this specific “paste an obfuscated command that downloads a binary” style attack.
curl | bash, Homebrew, and package managers
- Strong criticism of
curl | bashinstallers as “insane,” especially when promoted by big projects. - Some advocate Homebrew or other package managers as a more “civilized” alternative with checksums and versioning; others argue Homebrew is only slightly safer and has its own issues (security design history, dropping old macOS support, admin assumptions).
- Alternatives raised: MacPorts, Nix/devbox, native
.pkginstallers, or avoiding external managers entirely. - Broader theme: trust chains, reproducibility, and the tradeoff between convenience and security.
Google search quality, ads, and responsibility
- Many blame Google’s ad model and “enshittification” for malware surfacing as top sponsored results, often styled to mimic official support pages.
- Some say users must learn security hygiene and not blindly paste commands; others insist that if Google takes money and disguises ads as results, it bears responsibility not to promote obvious malware.
LLMs as defense or new attack surface
- One commenter suggests using LLMs instead of random web pages to vet commands.
- Others push back: LLMs are trained on the same web content, can confidently recommend malware (e.g. downloading random drivers), and are vulnerable to data poisoning.
- Concern that autonomous AI agents with browser/system access could be easily tricked by these attacks.
Social‑engineering patterns and user education
- Multiple examples mirror the article: fake support pages, “captcha” flows that ask users to paste commands (on macOS and Windows), and GitHub repos serving trojans.
- Emphasis that many attacks are social engineering, not pure technical exploits; repeated advice to be suspicious of obfuscated commands, shortened URLs, and unexpected permission prompts.