Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacOS Users Targeted by Infiniti Stealer Malware

MacOS Users Targeted by Infiniti Stealer Malware

Posted on March 27, 2026 By CWS

A newly identified malware known as Infiniti Stealer is posing a significant threat to macOS users by tricking them through counterfeit Cloudflare CAPTCHA pages. This sophisticated attack bypasses traditional software vulnerabilities, directly convincing users to execute malicious commands on their systems.

Understanding the Infiniti Stealer Threat

Infiniti Stealer employs a social engineering tactic called ClickFix, which is designed to deceive users into executing harmful commands without exploiting any software flaws. The malware, initially detected under the codename NukeChain, confronts the common belief that macOS is impervious to such threats. The malware came to wider attention when its control panel was inadvertently exposed online, revealing its true identity and confirming a targeted campaign against macOS users.

How the Attack is Carried Out

The attack initiates from a malicious domain, update-check[.]com, which replicates a Cloudflare verification page. Users visiting this site are instructed to open Terminal and input a specific command, unknowingly setting off the infection sequence. This method is particularly dangerous as it does not involve downloading files or opening phishing attachments, relying entirely on user trust in the fake CAPTCHA.

Once the command is executed, the malware operates stealthily, leaving no immediate signs of compromise. Its capabilities include harvesting credentials, collecting sensitive information, and sending data to a remote server, all while notifying the operator via Telegram.

Stages of the Malware Execution

Infiniti Stealer unfolds in three stages. Initially, a Bash dropper script decodes and executes the primary payload, concealing its actions from the user. The second stage involves an Apple Silicon Mach-O binary created with Nuitka, which complicates static analysis by security tools. Lastly, the Python-based final payload, UpdateHelper[.]bin, conducts the data theft while evading detection in analysis environments.

Victims are advised to cease sensitive activities on compromised devices, change passwords, and revoke active sessions. Conducting a full security scan is essential to ensure any remnants of the malware are removed.

Protecting Against Fake CAPTCHA Attacks

Users should be cautious of any site requesting Terminal commands as part of a CAPTCHA process. Such requests are illegitimate and should be closed immediately to prevent potential malware infection. Staying informed and vigilant is crucial in safeguarding against these evolving cyber threats.

For more updates on cybersecurity threats, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:CAPTCHA, Cloudflare, cyber threat, Cybersecurity, data theft, Infiniti Stealer, macOS, Malware, security alert, social engineering

Post navigation

Previous Post: Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’
Next Post: Urgent Patch Needed for Citrix NetScaler Vulnerabilities

Related Posts

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App Cyber Security News
FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration Cyber Security News
Hackers Exploiting telnetd Vulnerability for Root Access Hackers Exploiting telnetd Vulnerability for Root Access Cyber Security News
New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection Cyber Security News
TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections Cyber Security News
76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TP-Link Addresses Critical Flaws in Archer Routers
  • Geopolitical Tensions Fuel Cyber Conflict
  • PXA Stealer Targets Financial Firms with Phishing Attacks
  • iOS Exploit Kit Coruna Updates Past Exploits
  • Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TP-Link Addresses Critical Flaws in Archer Routers
  • Geopolitical Tensions Fuel Cyber Conflict
  • PXA Stealer Targets Financial Firms with Phishing Attacks
  • iOS Exploit Kit Coruna Updates Past Exploits
  • Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark