A deceptive social engineering campaign known as ClickFix is actively targeting macOS users to distribute the Infiniti Stealer malware. The attack leverages a convincing but fake Cloudflare CAPTCHA page that tricks the user into voluntarily executing a malicious command in their own Terminal. This action initiates a multi-stage infection process that results in the deployment of Infiniti Stealer, a potent Python-based malware. The stealer is capable of harvesting a broad range of sensitive information, including browser credentials, secrets from the macOS Keychain, cryptocurrency wallet data, and developer files. The stolen data is then exfiltrated to an attacker-controlled server, with notifications sent via Telegram.
The ClickFix campaign is a clever social engineering attack that preys on user trust in familiar web security mechanisms like Cloudflare's CAPTCHA. The attack flow is as follows:
This attack is notable for its reliance on manipulating the user into being an active participant in their own compromise.
TTPs and Malware Capabilities:
T1204.002 - Malicious File): While not a file, the attack relies on the user running malicious code from a command they are tricked into trusting.T1204.001): The entire infection chain is predicated on the user executing the initial command.T1059.004 - Unix Shell): The initial payload is a Bash script.T1555.003 - Credentials from Web Browsers): Steals cookies, passwords, and credit card information from various web browsers.T1555.001): Attempts to dump the contents of the macOS Keychain, which stores passwords and certificates.T1552.001 - Credentials In Files): Searches for files associated with cryptocurrency wallets.T1113): Takes screenshots of the user's desktop during execution.T1041 - Exfiltration Over C2 Channel): Bundles all stolen data and sends it via HTTP POST requests to a C2 server.The use of a Nuitka loader is a clever evasion technique. By compiling the Python stealer into a binary, the attackers can obfuscate the source code and make it more difficult for signature-based antivirus tools to detect.
A successful Infiniti Stealer infection can lead to a complete compromise of the victim's digital identity. The theft of browser and Keychain passwords can give attackers access to a wide range of online accounts, including email, banking, and social media. The loss of cryptocurrency wallets can result in direct and irreversible financial loss. For developers, the theft of secrets and credentials from their machine can lead to a broader supply chain attack against their employer or projects. The attack is a powerful reminder that macOS is not immune to malware and that sophisticated threats are actively targeting the platform.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| url_pattern | Pages mimicking Cloudflare CAPTCHA but asking for Terminal commands | The primary lure of the ClickFix campaign. | User education, web proxy logs. | high |
| command_line_pattern | `curl -sL [URL] | bash` | A common pattern used in the initial infection, where a script is downloaded from a URL and piped directly into bash. | EDR with command-line logging, shell history analysis. |
| process_name | Nuitka-Loader.py or similar |
The execution of a Nuitka-compiled binary may be anomalous on many systems. | Process monitoring on endpoints. | medium |
| network_traffic_pattern | Outbound POST request to unknown URL followed by connection to api.telegram.org |
This pattern could indicate data exfiltration followed by the C2 notification. | EDR, network security monitoring. | medium |
curl | bash command, followed by further network connections and file access. Reference D3FEND technique D3-PA - Process Analysis.The primary defense is training users to recognize that legitimate websites will never require them to execute terminal commands for verification.
In a corporate setting, use application control or execution prevention tools to block the running of unauthorized scripts and binaries.
Deploy a reputable EDR/antimalware solution for macOS that uses behavioral analysis to detect suspicious process chains like `curl | bash`.
The most effective defense against the ClickFix campaign is robust user education and awareness. This is a form of User Behavior Analysis where the user is the analyst. Security teams must train macOS users on a simple, unbreakable rule: No legitimate website, especially a security check like a CAPTCHA, will ever ask you to copy and paste a command into your Terminal. This action is equivalent to giving a stranger the keys to your house. Training materials should include screenshots of the fake Cloudflare page and explain that this is a social engineering trick to bypass all technical security controls. Empowering users to recognize and report this specific tactic is the most direct way to neutralize the threat, as the entire attack chain depends on the user's cooperation.
For technical detection, Process Analysis via an EDR solution is key. An EDR agent on the macOS endpoint can monitor for the specific, anomalous process chain created by this attack. A detection rule should be created to alert on the following sequence: a web browser process (e.g., Safari, Google Chrome) spawning a Terminal process (Terminal.app), which in turn spawns a shell (bash) that executes curl. This is a highly suspicious chain of events that rarely occurs during legitimate activity. By detecting this behavioral pattern, the EDR can alert security analysts or automatically terminate the process tree, preventing the Infiniti Stealer payload from ever being downloaded and executed. This moves the defense from relying solely on the user to having a technical backstop.
In managed corporate environments, Executable Allowlisting (Application Control) provides a powerful defense. macOS has built-in tools, and third-party solutions are also available, that can be configured to prevent the execution of any unauthorized code. In the context of the ClickFix attack, even though the user initiates the bash script, an application control policy could prevent that script from running if it's not signed by a trusted developer or located in an approved path. This 'default-deny' stance ensures that only vetted and approved software can run, effectively blocking the execution of the Nuitka loader and the Infiniti Stealer payload, regardless of how they arrive on the system. This is a high-maturity control but is extremely effective against user-initiated malware execution.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats