Infiniti Stealer:利用伪造 Cloudflare CAPTCHA 实施 ClickFix 攻击的 macOS 窃取器
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要快速浏览一下文章。文章讲的是一个新的macOS恶意软件,叫做Infiniti Stealer。它通过伪造Cloudflare的人类验证页面来欺骗用户。这个恶意软件使用ClickFix技术,让用户自己运行危险命令,绕过了软件漏洞的需要。 接着,文章提到很多Mac用户认为他们的系统不容易感染恶意软件,但Infiniti Stealer挑战了这个假设。它最初被追踪为NukeChain,在公开披露前,控制面板意外暴露,确认了这是一个针对macOS用户的结构化活动。 然后,分析指出Infiniti Stealer是第一个结合ClickFix交付和Nuitka编译Python窃取器的macOS活动。攻击开始于恶意域update-check.com,上面有一个几乎完美的Cloudflare验证页面副本。用户被指示打开终端并运行命令,这会触发整个感染链。 攻击不依赖软件漏洞,完全依赖用户信任伪造的CAPTCHA。一旦命令运行,恶意软件就会在后台静默执行,收集各种数据并发送到远程服务器。 感染链分为三个阶段:Bash dropper脚本、Nuitka加载二进制文件和最终的Python窃取器。最后还给了用户一些应对措施和警告。 现在我需要把这些信息浓缩到100字以内。重点包括:新恶意软件Infiniti Stealer通过伪造Cloudflare页面欺骗Mac用户运行命令;绕过漏洞利用;收集敏感数据;分阶段感染机制;以及提醒不要执行终端命令。 所以总结的时候要涵盖这些要点:新恶意软件、欺骗方式、绕过漏洞、收集数据、分阶段机制和警告。 </think> 一种新型 macOS 恶意软件 Infiniti Stealer 通过伪造 Cloudflare 验证页面诱骗用户运行危险命令,绕过软件漏洞利用。该恶意软件可窃取浏览器登录凭证、密钥链数据、加密货币钱包信息等敏感信息,并通过三阶段感染链完成攻击。提醒用户切勿在终端执行可疑命令以避免感染。 2026-3-27 07:50:0 Author: cybersecuritynews.com(查看原文) 阅读量:1 收藏

Fake Cloudflare CAPTCHA Pages Spread Infiniti Stealer Malware on macOS Systems

A new macOS malware that was undocumented previously, is quietly tricking users through fake Cloudflare human verification pages.

Called Infiniti Stealer, this threat uses a well-known social engineering trick called ClickFix to convince Mac users into running dangerous commands directly on their own machines, bypassing the need for any software vulnerability or exploit.

For a long time, many Mac users have believed their systems are naturally resistant to malware. Infiniti Stealer challenges that assumption directly. The malware was originally tracked under the internal name NukeChain during routine threat hunting.

Just before its public disclosure, the threat actor’s operator control panel accidentally became visible online, revealing the malware’s true name and confirming that this is a structured, ongoing campaign aimed directly at macOS users.

Malwarebytes analysts identified Infiniti Stealer as the first documented macOS campaign to combine ClickFix delivery with a Nuitka-compiled Python stealer.

The attack begins at a malicious domain, update-check[.]com, which hosts a near-perfect replica of a Cloudflare human verification page.

google

Fake Cloudflare CAPTCHA Page (Source - Malwarebytes)
Fake Cloudflare CAPTCHA Page (Source – Malwarebytes)

Visitors on the fake page are instructed to open Terminal, paste a provided command, and press Return. What appears to be a routine identity check immediately triggers the entire infection chain.

What makes this attack especially dangerous is that it does not rely on any software flaw. There is no malicious file to download, no phishing attachment, and no drive-by exploit.

The attacker depends entirely on the user trusting the fake CAPTCHA. Once the command is run, the malware’s payload executes silently in the background, leaving no obvious sign that anything has gone wrong.

The damage potential of Infiniti Stealer is serious and far-reaching. The malware is built to harvest login credentials from Chromium-based browsers and Firefox, collect macOS Keychain entries, drain cryptocurrency wallets, take screenshots during execution, and pull plaintext secrets from developer environment files such as .env.

All collected data is sent to a remote server via HTTP POST requests, and the operator receives an immediate Telegram notification once the upload is complete.

Three-Stage Infection Chain

Once the victim runs the Terminal command, Infiniti Stealer works through three separate stages to complete the compromise. The first is a Bash dropper script that uses a template also found in earlier macOS stealers like MacSync, suggesting the use of a shared malware builder.

Stage 1 Bash Dropper Script (Source - Malwarebytes)
Stage 1 Bash Dropper Script (Source – Malwarebytes)

The script decodes an embedded payload, writes the next stage binary to the /tmp folder, strips the macOS quarantine attribute, and runs the file silently using nohup.

It then deletes itself and closes Terminal via AppleScript, ensuring the victim sees nothing unusual.

The second stage delivers an Apple Silicon Mach-O binary of around 8.6 MB, built using Nuitka’s onefile mode.

Stage 2 Nuitka Loader Binary (Source - Malwarebytes)
Stage 2 Nuitka Loader Binary (Source – Malwarebytes)

Unlike PyInstaller, Nuitka compiles Python source code into C and produces a native binary, making static analysis significantly harder for security tools. At runtime, this loader decompresses around 35 MB of embedded data and hands off execution to the final payload.

The third stage, UpdateHelper[.]bin is a Python 3.11 stealer also compiled with Nuitka.

Before stealing any data, it checks whether it is running inside known analysis environments including any.run, Joe Sandbox, Hybrid Analysis, VMware, or VirtualBox.

It also adds a randomized execution delay to avoid triggering automated detection systems.

If you suspect you may have been affected, take these steps immediately:

  • Stop using the device for sensitive activity including banking, email, and work accounts
  • Change passwords from a clean device, starting with email, Apple ID, and banking credentials
  • Revoke active sessions and invalidate any API tokens or SSH keys
  • Look for any unusual files placed in /tmp and ~/Library/LaunchAgents/
  • Run a full security scan to detect and remove any remaining malware

No legitimate CAPTCHA page will ever ask you to open Terminal and run a command. If a website instructs you to do this, close it immediately.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews


文章来源: https://cybersecuritynews.com/fake-cloudflare-captcha-pages-spread-infiniti-stealer/
如有侵权请联系:admin#unsafe.sh