Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

0
Medium
Vulnerabilitypython
Published: Sat Mar 28 2026 (03/28/2026, 10:30:00 UTC)
Source: SecurityWeek

Description

A new attack campaign uses a Cloudflare-themed fake CAPTCHA page to trick Mac users into executing a malicious Bash script. This script subsequently runs a Nuitka loader that deploys the Infiniti stealer, a Python-based information stealer targeting macOS systems. The infection chain leverages social engineering to bypass user suspicion and execute code without requiring elevated privileges. Although no known exploits are reported in the wild yet, the attack demonstrates a sophisticated multi-stage infection process. The threat primarily targets Mac users, exploiting their trust in Cloudflare branding. The medium severity rating reflects the potential for data theft but limited scope and complexity of exploitation. Organizations with macOS endpoints should be vigilant against phishing and unauthorized script execution. Mitigations include restricting script execution, enhancing endpoint detection, and educating users about fake CAPTCHA scams. Countries with significant macOS usage and advanced threat actor presence are at higher risk. Overall, this attack highlights the evolving threat landscape for Mac environments and the need for layered defenses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 10:36:17 UTC

Technical Analysis

The Cloudflare-themed ClickFix attack is a multi-stage infection chain targeting macOS systems to deploy the Infiniti stealer, a Python-based information stealing malware. The attack begins with a social engineering lure—a fake CAPTCHA page mimicking Cloudflare's legitimate verification process—to convince users to execute a malicious Bash script. This script acts as a dropper and loader, invoking a Nuitka-compiled Python loader that subsequently runs the Infiniti stealer. Nuitka is a Python compiler that converts Python code into C executables, which helps evade some detection mechanisms. Infiniti stealer is designed to harvest sensitive information from infected Macs, including credentials, browser data, and possibly system information. The infection chain does not require elevated privileges but depends on user interaction to initiate the script execution. No specific affected software versions or CVEs are identified, and no known exploits are reported in the wild, indicating this is a targeted or emerging threat. The attack leverages trusted branding (Cloudflare) to lower user suspicion and employs multiple stages to evade detection. The medium severity rating reflects the moderate impact on confidentiality and integrity, limited availability impact, and moderate ease of exploitation due to required user interaction.

Potential Impact

This threat poses a significant risk to organizations and individuals using macOS systems by potentially compromising sensitive information such as credentials, personal data, and browser histories. The stolen data can lead to further attacks, including account takeovers, financial fraud, and corporate espionage. While the attack does not appear to cause direct system damage or availability loss, the confidentiality breach can have severe consequences, especially for enterprises handling sensitive or regulated data. The reliance on social engineering means that user awareness is a critical factor in the attack's success, but once compromised, the attacker gains persistent access to valuable data. The multi-stage nature of the attack complicates detection and response, increasing dwell time and potential damage. Organizations with remote or mobile Mac users are particularly vulnerable. The absence of known exploits in the wild suggests the threat is emerging, but it could escalate rapidly if adopted by widespread threat actors.

Mitigation Recommendations

To mitigate this threat, organizations should implement strict execution policies on macOS endpoints to prevent unauthorized Bash script execution, such as using macOS Gatekeeper and restricting terminal access. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious script behavior and Nuitka-compiled binaries. Educate users to recognize fake CAPTCHA pages and avoid executing scripts from untrusted sources or links, emphasizing the risks of social engineering. Employ network-level protections to block access to known malicious domains and monitor DNS queries for suspicious activity related to the attack infrastructure. Regularly update macOS and security software to leverage the latest protections. Consider application whitelisting to prevent unauthorized code execution. Incident response teams should be prepared to analyze multi-stage infection chains and remove persistent loaders. Finally, monitor threat intelligence feeds for updates on this attack and related indicators of compromise to enable proactive defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 69c7af0f2b68dbd88edf21e9

Added to database: 3/28/2026, 10:35:59 AM

Last enriched: 3/28/2026, 10:36:17 AM

Last updated: 3/28/2026, 11:40:55 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses