Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mac Users Face New Cloudflare-Themed Malware Threat

Mac Users Face New Cloudflare-Themed Malware Threat

Posted on March 28, 2026 By CWS

In a recent cybersecurity development, macOS users are being targeted by a new campaign using Cloudflare-themed verification pages to deliver a Python-based information stealer, according to a report by Malwarebytes.

How the Attack Unfolds

The attack initiates with a counterfeit CAPTCHA page that mimics a legitimate Cloudflare human verification process. This page prompts users to paste and execute a command in the Terminal, creating an illusion of authenticity.

Known as ClickFix, this technique predominantly leverages social engineering to deceive users into executing harmful commands. Initially used against Windows systems, this method has been adapted for macOS since August 2024, with increasing sophistication.

Execution and Payload

The fraudulent verification page provides explicit instructions for macOS users to engage with the Terminal, leading to the execution of a malicious command. This command fetches a Bash script from a remote server, which in turn decodes a payload, places a binary in a temporary directory, and executes it.

The script passes necessary command-and-control server details and authentication tokens, then self-deletes and terminates the Terminal session. The binary is a loader built using Nuitka, complicating static analysis by converting Python code into a native format.

The Impact of Infiniti Stealer

Upon execution, the loader activates the final payload, identified as the Infiniti Stealer malware. This Python-based stealer targets sensitive data such as browser credentials, Keychain information, cryptocurrency wallets, developer file secrets, and captures screenshots.

Information gathered is transmitted to a command-and-control server via HTTP POST requests. Subsequently, a notification is dispatched to a Telegram channel, and the captured credentials are queued for further cracking.

Infiniti Stealer employs strategies like randomized execution delays and checks for analysis environments to avoid detection. Malwarebytes highlights the adaptation of Windows-targeted techniques like ClickFix for macOS users, alongside new methods such as compiling Python into native applications, which complicates detection and analysis. This trend could signal more such attacks in the future.

Related readings include reports on BoryptGrab Stealer distribution, the emergence of the ‘SolyxImmortal’ information stealer, and North Korean hackers targeting macOS developers.

Security Week News Tags:ClickFix campaign, Cloudflare malware, cybersecurity news, Infiniti Stealer, information stealer, macOS security, malware attack, Python malware, social engineering, terminal command

Post navigation

Previous Post: Critical Citrix NetScaler Flaw Under Active Scrutiny

Related Posts

Cyberattack Disrupts Check-In Systems at Major European Airports Cyberattack Disrupts Check-In Systems at Major European Airports Security Week News
Insight Partners Confirms Data Breach Result of Ransomware Attack Insight Partners Confirms Data Breach Result of Ransomware Attack Security Week News
Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack Security Week News
React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts Security Week News
Tenzai Raises  Million in Seed Funding to Build AI-Powered Pentesting Platform Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform Security Week News
Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark