MacOS Tahoe 26.4 adds a pause when paste commands to stop social engineering attacks on the Terminal

Published 4 min de lectura 184 reading

Since the candidate version of Tahoe 26.4 macos began to circulate, several users have noticed a subtle but relevant change in the way the system treats the commands glued to Terminal. According to reports, the system now stops the execution when it detects that the glued content could be dangerous and shows a warning that explains why such action could pose a risk to the equipment. It is not an absolute block, but an intervention designed to stop attacks based on social engineering.

This measure was not detailed in the official notes of the update, although Apple did publish the notes of the version on its developer portal ( macOS Tahoe 26.4 release notes). The emergence of the new alert was documented by users in forums and social networks, for example in a thread of the MacOS Beta community in Reddit ( reports in Reddit) and in individual publications in X ( an example of user who investigated the behavior).

MacOS Tahoe 26.4 adds a pause when paste commands to stop social engineering attacks on the Terminal
Image generated with IA.

The apparent objective of this change is to stop what the security community knows as ClickFix attacks: handling techniques that encourage the victim to copy and paste an order into the terminal with the promise to "fix" something or to verify an account. As the victim himself introduces the command, many automated defenses are left out and the malicious code is run with the user's permissions. The intervention of macOS attempts to break that link: to interrupt the inertia of the glued and to force a reflective pause.

According to public observations, when the system detects a stick from a command from Safari to Terminal, it shows a picture that the execution was stopped and that no damage has occurred. The alert also explains, in general, that scammers often distribute dangerous instructions by malicious messages, forums or extensions. Users may choose not to continue, or ignore the warning and continue if they know exactly what the order does.

Reports are not unanimous in terms of their internal functioning. Some probators claim that the warning appears only once per session, because after seeing several dangerous orders like sudo rm -rf / They stopped receiving warnings. Others have suggested that the system does some kind of heuristic analysis, as harmless commands do not activate the alert. Apple, so far, has not published a support document describing how it detects and classifies those glued as risky, and specialized media have tried to collect more information by contacting the company directly ( BleepingComputer is among those who have reported and sought answers).

There are no magical solutions in the field of safety: This warning is welcome, but it must not be an excuse to lower the guard.. It remains to be clarified which signals use macOS to fire the alert - if it is based on the source of the text, patterns within the glued chain or other telemetry - and if these rules can be circumvented by more sophisticated attackers. This is why experts continue to recommend caution in the execution of copied instructions from the Internet.

MacOS Tahoe 26.4 adds a pause when paste commands to stop social engineering attacks on the Terminal
Image generated with IA.

If you work with Terminal and want to reduce the risk, there are simple practices that help avoid falling into traps: carefully review each command before running it, paste first into a text editor to inspect its content, distrust "magic" solutions shared in networks and forums, and prefer operations with no high privileges where possible. Whenever an instruction comes from an unverified source, it is most prudent not to execute it..

The Apple change places attention where it should be: in giving the user time to think before running code that could compromise the system. However, the security community will remain vigilant and users should maintain an active verification attitude. For those who want to follow the development of this function and read the reports of those who have already tested it, community entries and Apple notes are good starting points: the above-mentioned conversation in Reddit is available at that thread and official documentation can be consulted at the notes of the version. In addition, specialized means such as BleepingComputer have covered the initial reports and are in contact with Apple for clarification.

In short, the novelty of Tahoe 26.4 macOS is an interesting advance in the protection against traps based on copying and hitting. It's one more layer of human-oriented defense, not the final panacea. and it should be combined with good habits, skepticism at external instructions and, when necessary, seek technical advice before executing commands that are not fully understood.

Coverage

Related

More news on the same subject.