New Infinity Stealer: macOS Users Targeted by Sophisticated ClickFix "Cloudflare" CAPTCHA Lures

By Imthiyaz Ali
New Infinity Stealer: macOS Users Targeted by Sophisticated ClickFix "Cloudflare" CAPTCHA Lures

A sophisticated new malware campaign, dubbed Infinity Stealer, is actively targeting macOS users through a deceptive "ClickFix" social engineering tactic. By impersonating legitimate services like Cloudflare, attackers trick users into executing malicious code that harvests high-value data, including browser credentials, cryptocurrency wallets, and developer secrets.

The "ClickFix" Infection Vector

The attack begins when a user visits a compromised or malicious website. Instead of the expected content, they are presented with a fake Cloudflare CAPTCHA or a browser error message. The page instructs the user to "fix" the issue by clicking a button that copies a command to their clipboard and instructs them to paste and run it in the macOS Terminal.

This bypasses traditional browser security prompts by leveraging the user's own administrative trust. Once the command is executed, it downloads and launches the Infinity Stealer payload.

Technical Analysis of the Payload

Infinity Stealer is a Python-based malware, but it is notably compiled into a native macOS executable using the Nuitka compiler. This technique makes the code harder to reverse-engineer compared to standard Python scripts and allows it to run seamlessly on macOS environments without requiring a pre-installed Python interpreter.

Key Capabilities:

  • Anti-Analysis: The malware performs checks for virtual machines and debugging environments to avoid detection by security researchers.
  • Credential Harvesting: It targets Google Chrome, Safari, and Firefox to steal saved passwords, cookies, and autofill data.
  • macOS Keychain Extraction: It attempts to access the system Keychain to retrieve sensitive certificates and account credentials.
  • Crypto & Developer Theft: The stealer scans for cryptocurrency wallet extensions (MetaMask, Phantom) and searches for .env files or .ssh folders to grab plaintext developer secrets and API keys.

Command and Control (C2) Infrastructure

The stolen data is bundled into a ZIP archive and exfiltrated to a remote server via HTTP POST requests. Simultaneously, the malware sends a notification to the attacker's Telegram bot, providing a real-time "hit" notification that includes the victim's IP address, system specifications, and a summary of stolen items.

Impact and Statistics

While the exact number of victims is evolving, the "ClickFix" methodology has seen a 40% increase in deployment across various malware families in early 2026 due to its high success rate against non-technical users.

Feature Details
Malware Type Infostealer (Spyware)
Primary Target macOS (Intel & Apple Silicon)
Programming Language Python (Compiled via Nuitka)
Exfiltration Method HTTP API & Telegram Bot API
Threat Level Critical (High Data Sensitivity)

How to Protect Your macOS Device

To defend against Infinity Stealer and similar "ClickFix" campaigns, security professionals recommend the following:

  • Never Paste Commands: Legitimate services like Cloudflare or Google will never ask you to copy/paste code into your Terminal or PowerShell to solve a CAPTCHA.
  • Use Managed Browser Policies: For organizations, disable the ability for users to access the Terminal or restrict execution of unsigned binaries.
  • Deploy EDR: Utilize Endpoint Detection and Response (EDR) tools that can identify the execution of suspicious Python-compiled binaries.
  • Audit Developer Secrets: Use secret-scanning tools to ensure API keys are not stored in plaintext in local directories.

Reference Links & Sources

Imthiyaz Ali
Imthiyaz Ali
Imtiyaz is an experienced Cybersecurity Professional with over 5 years of experience in Cybersecurity Research.