Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacOS Users Targeted by Infiniti Stealer Malware

MacOS Users Targeted by Infiniti Stealer Malware

Posted on March 27, 2026 By CWS

A newly identified malware known as Infiniti Stealer is posing a significant threat to macOS users by tricking them through counterfeit Cloudflare CAPTCHA pages. This sophisticated attack bypasses traditional software vulnerabilities, directly convincing users to execute malicious commands on their systems.

Understanding the Infiniti Stealer Threat

Infiniti Stealer employs a social engineering tactic called ClickFix, which is designed to deceive users into executing harmful commands without exploiting any software flaws. The malware, initially detected under the codename NukeChain, confronts the common belief that macOS is impervious to such threats. The malware came to wider attention when its control panel was inadvertently exposed online, revealing its true identity and confirming a targeted campaign against macOS users.

How the Attack is Carried Out

The attack initiates from a malicious domain, update-check[.]com, which replicates a Cloudflare verification page. Users visiting this site are instructed to open Terminal and input a specific command, unknowingly setting off the infection sequence. This method is particularly dangerous as it does not involve downloading files or opening phishing attachments, relying entirely on user trust in the fake CAPTCHA.

Once the command is executed, the malware operates stealthily, leaving no immediate signs of compromise. Its capabilities include harvesting credentials, collecting sensitive information, and sending data to a remote server, all while notifying the operator via Telegram.

Stages of the Malware Execution

Infiniti Stealer unfolds in three stages. Initially, a Bash dropper script decodes and executes the primary payload, concealing its actions from the user. The second stage involves an Apple Silicon Mach-O binary created with Nuitka, which complicates static analysis by security tools. Lastly, the Python-based final payload, UpdateHelper[.]bin, conducts the data theft while evading detection in analysis environments.

Victims are advised to cease sensitive activities on compromised devices, change passwords, and revoke active sessions. Conducting a full security scan is essential to ensure any remnants of the malware are removed.

Protecting Against Fake CAPTCHA Attacks

Users should be cautious of any site requesting Terminal commands as part of a CAPTCHA process. Such requests are illegitimate and should be closed immediately to prevent potential malware infection. Staying informed and vigilant is crucial in safeguarding against these evolving cyber threats.

For more updates on cybersecurity threats, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:CAPTCHA, Cloudflare, cyber threat, Cybersecurity, data theft, Infiniti Stealer, macOS, Malware, security alert, social engineering

Post navigation

Previous Post: Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’
Next Post: Urgent Patch Needed for Citrix NetScaler Vulnerabilities

Related Posts

New Phishing Attack Targeting Meta Business Suite Users to Steal Login Credentials New Phishing Attack Targeting Meta Business Suite Users to Steal Login Credentials Cyber Security News
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Cyber Security News
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Cyber Security News
Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems Cyber Security News
Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Cyber Security News
Roundcube Webmail Update Fixes Critical Security Flaws Roundcube Webmail Update Fixes Critical Security Flaws Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Security Gap in PTC Software Alarms German Authorities
  • Security Flaws in AI Frameworks Expose Sensitive Data
  • Urgent Patch Needed for Citrix NetScaler Vulnerabilities
  • MacOS Users Targeted by Infiniti Stealer Malware
  • Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Security Gap in PTC Software Alarms German Authorities
  • Security Flaws in AI Frameworks Expose Sensitive Data
  • Urgent Patch Needed for Citrix NetScaler Vulnerabilities
  • MacOS Users Targeted by Infiniti Stealer Malware
  • Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark