Get all your news in one place.
100's of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Another worrying macOS malware scheme has been discovered — here's how to stay safe

A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.

  • Malwarebytes uncovers Infiniti Stealer targeting macOS via ClickFix social engineering
  • Victims tricked into running malicious Terminal code, bypassing traditional defenses
  • Stealer compiled with Nuitka, exfiltrates browser credentials, Keychain data, wallets, and screenshots

MacOS devices are being increasingly targeted with malware, as security researchers discover yet another infostealer variant in the wild.

Malwarebytes published an in-depth report on a piece of malware called Infiniti Stealer, which was apparently compiled in a rather unusual fashion.

Infiniti Stealer is apparently distributed via a ClickFix social engineering attack. A ClickFix attack tricks the victim by presenting a “problem” and, at the same time, offering a “solution”. In this case, Malwarebytes says the victims are being redirected to update-check[.]com (most likely through phishing emails claiming certain software needs updating in order to work properly) where they are shown a benign-looking CAPTCHA.

Compiled with Nuitka

Besides the usual “I am not a robot” checkbox, the CAPTCHA has an additional step (which should also serve as a major red flag): to open Spotlight (the built-in search tool), run Terminal, and paste the given code. This code runs a dropper which, in turn, delivers Infiniti Stealer.

“Because the user runs the command directly, many traditional defenses are bypassed,” Malwarebytes explained. “There’s no exploit, no malicious attachment, and no drive‑by download.”

What makes this malware stand out is the fact that it is written in Python, but compiled with Nuitka, a compiler that converts Python code into standalone executables or optimized binaries.

The resulting product is a native macOS binary which, according to the researchers, makes it harder to analyze and detect compared to your typical off-the-shelf Python-based malware.

“To our knowledge, this is the first documented macOS campaign combining ClickFix delivery with a Nuitka-compiled Python stealer,” Malwarebytes said.

An infostealer is a malware variant designed to exfiltrate sensitive data from target devices. Usually delivered through social engineering, infostealers get installed through droppers, and try to upload various types of information to an attacker-controlled server, including browser data (cookies, stored passwords, cryptocurrency wallet plugins, etc.) passwords, sensitive files (.docx, .txt, .pdf, and other formats), and other files deemed of value.

Depending on the type of malware, these can try to upload more or less data, and come with different obfuscation and persistence mechanisms.

How to stay safe from phishing and infostealers

Phishing is one of the most popular attack vectors today (Image credit: weerapatkiatdumrong / Getty Images)

Infiniti is capable of stealing a wide range of sensitive data. Primarily, it hunts for credentials from Chromium-based browsers, as well as Firefox. It can exfiltrate macOS Keychain entries, cryptocurrency wallets, and plaintext secrets in developer files such as .env. Finally, it will also exfiltrate screenshots captured during execution.

Social engineering is a popular scam tactic, and phishing emails continue being the biggest attack vector out there. To prevent falling prey to these campaigns, exercise caution and a high level of skepticism towards any and all incoming communications, be it email, instant messaging, or phone. Double-check all links being shared in the email, and hunt for typos, letters replaced by numbers, and otherwise suspicious variations of known domains. (For example, microsoft is often spelled with an “RN” instead of “M” in phishing emails - rnicrosoft - making it almost indistinguishable).

Be careful when downloading attachments (especially when receiving an unexpected message) and make sure you’re running phishing-proof multi-factor authentication.

Via BleepingComputer



Sign up to read this article
Read news from 100's of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.