Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs
    Cybersecurity

    Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

    adminBy adminMarch 28, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    macOS malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    macOS users are targeted in a fresh ClickFix campaign that uses a Cloudflare-themed verification page to deliver a Python-based information stealer, Malwarebytes reports.

    The attack starts with a fake CAPTCHA page that serves a legitimate-looking Cloudflare human verification page asking visitors to paste and execute a command in Terminal.

    Referred to as ClickFix, the technique relies on social engineering to trick users into executing malicious commands on their devices and has been widely used in attacks since August 2024, mainly against Windows users.

    For more than half a year, however, attacks tailored for macOS have become increasingly convincing, and the variant observed by Malwarebytes is no different.

    The fake verification page provides macOS users with specific instructions to open the Terminal and paste and execute a fake verification command that triggers malware execution.

    Once the victim runs the command, a Bash script is fetched from a remote server. The script decodes an embedded payload, writes the second stage binary to a temporary folder, removes its quarantine flag, and executes it.

    Advertisement. Scroll to continue reading.

    The script also passes command-and-control (C&C) server and authentication tokens as environment variables, deletes itself, and closes the Terminal.

    The binary dropped by the script is a loader compiled using Nuitka. The compiler transforms Python code into a native binary, making static analysis more difficult.

    At runtime, the loader decompresses embedded data and launches the final payload, identified as the Infiniti Stealer malware.

    The Python-based information stealer targets browser credentials, Keychain information, cryptocurrency wallets, secrets stored in developer files, and screenshots captured during execution.

    The data is sent to the C&C via HTTP POST requests. Once the operation has been completed, the malware sends a notification to a Telegram channel and queues captured credentials to be cracked on the server.

    For evasion, Infiniti Stealer relies on randomized execution delay and checks if the system is a known analysis environment.

    “Infiniti Stealer shows how techniques that worked on Windows—like ClickFix—are now being adapted to target Mac users. It also uses newer techniques, like compiling Python into native apps, which makes the malware harder to detect and analyze. If this approach proves effective, we may see more attacks like this,” Malwarebytes notes.

    Related: Over 100 GitHub Repositories Distributing BoryptGrab Stealer

    Related: ‘SolyxImmortal’ Information Stealer Emerges

    Related: North Korean Hackers Target macOS Developers via Malicious VS Code Projects

    Related: MacSync macOS Malware Distributed via Signed Swift Application

    Attack ClickFix CloudflareThemed Drops Infiniti Macs Stealer
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYou’re probably using this audio format without realizing it
    Next Article The Best TV Deals I Found in Amazon’s Big Spring Sale
    admin
    • Website

    Related Posts

    CIOs fret over rising security concerns amid AI adoption

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Try Using the 3-3-3 Rule to Stick to an Exercise Routine

    April 16, 2026

    CIOs fret over rising security concerns amid AI adoption

    April 16, 2026

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,348)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (828)
    • Tech Tools & Mobile / Apps (1,613)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Try Using the 3-3-3 Rule to Stick to an Exercise Routine

    April 16, 2026

    CIOs fret over rising security concerns amid AI adoption

    April 16, 2026

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026
    Most Popular
    • Try Using the 3-3-3 Rule to Stick to an Exercise Routine
    • CIOs fret over rising security concerns amid AI adoption
    • ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows
    • Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
    • How to Use Google Ads Brand Guidelines for Cleaner Automated Assets
    • Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.