Executive Summary
In March 2026, a new macOS-targeted malware named Infinity Stealer emerged, utilizing the ClickFix technique to deceive users into executing malicious code. The malware is delivered through fake CAPTCHA prompts that mimic Cloudflare's human verification, instructing users to paste a base64-obfuscated curl command into the macOS Terminal. This command downloads and executes a Python payload compiled with Nuitka, resulting in a native binary that is more resistant to static analysis. Once executed, Infinity Stealer performs anti-analysis checks and proceeds to exfiltrate sensitive data, including browser credentials, Keychain entries, cryptocurrency wallets, and plaintext secrets from developer files, via HTTP POST requests to a command-and-control server. (microsoft.com)
The emergence of Infinity Stealer highlights a growing trend of sophisticated malware targeting macOS systems, leveraging advanced social engineering techniques and cross-platform development tools. This incident underscores the importance of user vigilance and the need for robust security measures to protect against evolving threats.
Why This Matters Now
The rise of sophisticated macOS-targeted malware like Infinity Stealer demonstrates that attackers are increasingly focusing on Apple's ecosystem, exploiting user trust and advanced evasion techniques. Organizations and individuals must enhance their security posture to defend against these evolving threats.
Attack Path Analysis
The Infinity Stealer attack begins with a ClickFix lure, tricking users into executing a malicious command in the macOS Terminal. This command downloads and executes a Python-based infostealer compiled with Nuitka, which performs anti-analysis checks before harvesting sensitive data. The malware then establishes a command-and-control channel to exfiltrate the collected information.
Kill Chain Progression
Initial Compromise
Description
The attacker uses a ClickFix lure, presenting a fake CAPTCHA that instructs the user to paste a base64-obfuscated curl command into the macOS Terminal, leading to the download and execution of a malicious script.
MITRE ATT&CK® Techniques
Spearphishing Attachment
Malicious File
Command and Scripting Interpreter: Python
Deobfuscate/Decode Files or Information
Credentials from Password Stores: Keychain
Screen Capture
Exfiltration Over C2 Channel
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Malicious Software Prevention
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – User Training and Awareness
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Infinity Stealer's Python-based payload targeting developer files and .env secrets poses critical risks to software development environments and source code protection.
Financial Services
macOS infostealer harvesting cryptocurrency wallets and browser credentials threatens financial institutions using Apple systems for secure transaction processing and client data.
Information Technology/IT
ClickFix social engineering bypassing macOS defenses requires enhanced security controls and user training for IT organizations managing enterprise Apple deployments.
Computer/Network Security
Nuitka-compiled malware evading static analysis demonstrates evolution of macOS threats requiring updated detection capabilities and endpoint protection strategies.
Sources
- New Infinity Stealer malware grabs macOS data via ClickFix lureshttps://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/Verified
- Infostealers without borders: macOS, Python stealers, and platform abusehttps://www.microsoft.com/en-us/security/blog/2026/02/02/infostealers-without-borders-macos-python-stealers-and-platform-abuse/Verified
- Fake macOS help sites push Shamos infostealer via ClickFix techniquehttps://www.helpnetsecurity.com/2025/08/25/fake-macos-help-sites-push-shamos-infostealer-via-clickfix-technique/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could limit the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to execute unauthorized scripts may be constrained by enforcing strict identity-aware access controls and monitoring for anomalous command executions.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges could be limited by enforcing strict segmentation policies that restrict access to sensitive system components.
Control: East-West Traffic Security
Mitigation: The attacker's potential lateral movement within the network could be constrained by monitoring and controlling east-west traffic between workloads.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command-and-control channels may be limited by monitoring and controlling outbound communications across multicloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data could be constrained by enforcing strict egress policies that monitor and control outbound data flows.
The potential impact of unauthorized data access and identity theft could be reduced by limiting the attacker's ability to exfiltrate sensitive information.
Impact at a Glance
Affected Business Functions
- User Credential Management
- Cryptocurrency Transactions
- Software Development
- Web Browsing
Estimated downtime: N/A
Estimated loss: N/A
User credentials from browsers and Keychain, cryptocurrency wallet information, and plaintext secrets in developer files.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict unauthorized execution of scripts and binaries.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Threat Detection & Anomaly Response systems to identify and respond to unusual activities indicative of malware execution.
- • Educate users on the risks of executing unverified commands and the importance of verifying the authenticity of prompts.
- • Regularly update and patch systems to mitigate vulnerabilities that could be exploited by malware.



