Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mac Users Face New Cloudflare-Themed Malware Threat

Mac Users Face New Cloudflare-Themed Malware Threat

Posted on March 28, 2026 By CWS

In a recent cybersecurity development, macOS users are being targeted by a new campaign using Cloudflare-themed verification pages to deliver a Python-based information stealer, according to a report by Malwarebytes.

How the Attack Unfolds

The attack initiates with a counterfeit CAPTCHA page that mimics a legitimate Cloudflare human verification process. This page prompts users to paste and execute a command in the Terminal, creating an illusion of authenticity.

Known as ClickFix, this technique predominantly leverages social engineering to deceive users into executing harmful commands. Initially used against Windows systems, this method has been adapted for macOS since August 2024, with increasing sophistication.

Execution and Payload

The fraudulent verification page provides explicit instructions for macOS users to engage with the Terminal, leading to the execution of a malicious command. This command fetches a Bash script from a remote server, which in turn decodes a payload, places a binary in a temporary directory, and executes it.

The script passes necessary command-and-control server details and authentication tokens, then self-deletes and terminates the Terminal session. The binary is a loader built using Nuitka, complicating static analysis by converting Python code into a native format.

The Impact of Infiniti Stealer

Upon execution, the loader activates the final payload, identified as the Infiniti Stealer malware. This Python-based stealer targets sensitive data such as browser credentials, Keychain information, cryptocurrency wallets, developer file secrets, and captures screenshots.

Information gathered is transmitted to a command-and-control server via HTTP POST requests. Subsequently, a notification is dispatched to a Telegram channel, and the captured credentials are queued for further cracking.

Infiniti Stealer employs strategies like randomized execution delays and checks for analysis environments to avoid detection. Malwarebytes highlights the adaptation of Windows-targeted techniques like ClickFix for macOS users, alongside new methods such as compiling Python into native applications, which complicates detection and analysis. This trend could signal more such attacks in the future.

Related readings include reports on BoryptGrab Stealer distribution, the emergence of the ‘SolyxImmortal’ information stealer, and North Korean hackers targeting macOS developers.

Security Week News Tags:ClickFix campaign, Cloudflare malware, cybersecurity news, Infiniti Stealer, information stealer, macOS security, malware attack, Python malware, social engineering, terminal command

Post navigation

Previous Post: Critical Citrix NetScaler Flaw Under Active Scrutiny
Next Post: Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Related Posts

AI-Driven Breach Exposes FortiGate Firewalls Globally AI-Driven Breach Exposes FortiGate Firewalls Globally Security Week News
Man Who Hacked Organizations to Advertise Security Services Pleads Guilty Man Who Hacked Organizations to Advertise Security Services Pleads Guilty Security Week News
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm Security Week News
Copperhelm Secures M for Innovative Cloud Security Copperhelm Secures $7M for Innovative Cloud Security Security Week News
April 2026 Sees 33 Major Cybersecurity M&A Deals April 2026 Sees 33 Major Cybersecurity M&A Deals Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark