Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacOS Users Targeted by Infiniti Stealer Malware

MacOS Users Targeted by Infiniti Stealer Malware

Posted on March 27, 2026 By CWS

A newly identified malware known as Infiniti Stealer is posing a significant threat to macOS users by tricking them through counterfeit Cloudflare CAPTCHA pages. This sophisticated attack bypasses traditional software vulnerabilities, directly convincing users to execute malicious commands on their systems.

Understanding the Infiniti Stealer Threat

Infiniti Stealer employs a social engineering tactic called ClickFix, which is designed to deceive users into executing harmful commands without exploiting any software flaws. The malware, initially detected under the codename NukeChain, confronts the common belief that macOS is impervious to such threats. The malware came to wider attention when its control panel was inadvertently exposed online, revealing its true identity and confirming a targeted campaign against macOS users.

How the Attack is Carried Out

The attack initiates from a malicious domain, update-check[.]com, which replicates a Cloudflare verification page. Users visiting this site are instructed to open Terminal and input a specific command, unknowingly setting off the infection sequence. This method is particularly dangerous as it does not involve downloading files or opening phishing attachments, relying entirely on user trust in the fake CAPTCHA.

Once the command is executed, the malware operates stealthily, leaving no immediate signs of compromise. Its capabilities include harvesting credentials, collecting sensitive information, and sending data to a remote server, all while notifying the operator via Telegram.

Stages of the Malware Execution

Infiniti Stealer unfolds in three stages. Initially, a Bash dropper script decodes and executes the primary payload, concealing its actions from the user. The second stage involves an Apple Silicon Mach-O binary created with Nuitka, which complicates static analysis by security tools. Lastly, the Python-based final payload, UpdateHelper[.]bin, conducts the data theft while evading detection in analysis environments.

Victims are advised to cease sensitive activities on compromised devices, change passwords, and revoke active sessions. Conducting a full security scan is essential to ensure any remnants of the malware are removed.

Protecting Against Fake CAPTCHA Attacks

Users should be cautious of any site requesting Terminal commands as part of a CAPTCHA process. Such requests are illegitimate and should be closed immediately to prevent potential malware infection. Staying informed and vigilant is crucial in safeguarding against these evolving cyber threats.

For more updates on cybersecurity threats, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:CAPTCHA, Cloudflare, cyber threat, Cybersecurity, data theft, Infiniti Stealer, macOS, Malware, security alert, social engineering

Post navigation

Previous Post: Sensitive Leaks Reveal Anthropic’s New AI Model ‘Claude Mythos’
Next Post: Urgent Patch Needed for Citrix NetScaler Vulnerabilities

Related Posts

Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
11 Best SysAdmin Tools – 2025 11 Best SysAdmin Tools – 2025 Cyber Security News
Spam Campaign Utilizes Fake PDFs for Remote Access Spam Campaign Utilizes Fake PDFs for Remote Access Cyber Security News
Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges Cyber Security News
TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access Cyber Security News
Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark