GoPlus: Malicious software Infiniti Stealer targets Mac users with attacks on encrypted wallets

robot
Abstract generation in progress

Deep Tide TechFlow message. On March 30, according to GoPlus Security, a data-stealing malware called Infiniti Stealer is using a “ClickFix” social engineering attack to target encryption wallets and sensitive credentials for Mac users.

The attackers forge a highly realistic Cloudflare verification code page, tricking users into opening the terminal and manually pasting to execute malicious commands. After the commands are executed, the script removes the macOS quarantine attribute and writes the next stage payload into the /tmp directory to run silently. The final payload is a native macOS binary compiled with Nuitka, significantly increasing the difficulty for security tools to detect it.

Once Infiniti Stealer is deployed, it can steal credentials from Chromium/Firefox browsers, the macOS keychain, encryption wallets, and developer key files (such as .env files), and it also has sandbox detection and delayed execution capabilities to evade tracking.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin