Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures
New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures
NEWS

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler, delivered through deceptive ClickFix browser-fix lure campaigns.

Dylan H.

News Desk

March 28, 2026
5 min read

A new macOS-targeting information stealer called Infinity Stealer has been identified targeting Apple users via the increasingly prevalent ClickFix social engineering technique. The malware is written in Python and compiled into a standalone executable using the open-source Nuitka compiler, making it harder to detect and analyse through traditional methods.

What Is Infinity Stealer

Infinity Stealer is a newly discovered info-stealer malware designed specifically to target macOS systems. Its primary objective is to harvest sensitive data from compromised machines — including browser credentials, cookies, cryptocurrency wallet data, and other personal information — and exfiltrate it to attacker-controlled infrastructure.

Key technical characteristics:

  • Language: Python (compiled to a native executable via Nuitka)
  • Target Platform: macOS
  • Delivery Method: ClickFix social engineering lures
  • Packaging: Nuitka-compiled standalone binary (disguises Python origin, complicates reverse engineering)
  • Category: Info-stealer / credential harvester

The ClickFix Delivery Mechanism

ClickFix is a social engineering technique that has surged in popularity among threat actors across multiple malware campaigns. The lure presents victims with a fake browser error or warning, instructing them to:

  1. Copy a command from the page
  2. Open a terminal or run dialog
  3. Paste and execute the command — which silently installs malware

In the Infinity Stealer campaign, the ClickFix lure is tailored for macOS users, directing victims to open Terminal and run a command that downloads and executes the Nuitka-compiled Python payload. The lure is designed to appear as a legitimate browser fix or update instruction, exploiting user trust in browser security prompts.

Common ClickFix lure themes observed across campaigns include:

  • Fake "browser update required" warnings
  • Fake CAPTCHA verification failures
  • Fake software activation or font installation prompts
  • Impersonated cloud service error pages

Nuitka Packaging — Why It Matters

The use of Nuitka to compile the Python payload into a standalone macOS executable is a deliberate evasion technique:

  • Detection evasion: Nuitka-compiled binaries do not present as Python scripts and may bypass security tools that scan for .py files or common Python malware patterns
  • Analysis friction: Compiled binaries are harder to reverse-engineer than raw Python scripts, slowing down incident response and threat intelligence efforts
  • Standalone deployment: No Python runtime needs to be installed on the victim machine — the executable runs natively, broadening the target population

This packaging approach is consistent with a trend of threat actors using legitimate compilation tools (PyInstaller, cx_Freeze, Nuitka) to harden Python malware against detection.

What Infinity Stealer Targets

Based on the malware's classification as an info-stealer, typical data targets for this category include:

  • Browser credentials: Saved passwords, autofill data, and session cookies from Safari, Chrome, Firefox, and Brave
  • Cryptocurrency wallets: Wallet files and seed phrases from popular macOS-compatible crypto wallet applications
  • macOS Keychain: Stored passwords, certificates, and secure notes (where accessible)
  • Application tokens: API keys and tokens stored in app configuration files
  • Documents and files: Targeted file types (PDFs, spreadsheets, credential files) from common locations

Why macOS Targets Are Increasingly Valuable

The shift toward macOS-targeting malware reflects the changing threat landscape:

  • Enterprise adoption: macOS has grown significantly in corporate environments, making it a higher-value target for credential theft
  • Developer machines: Developers on macOS often hold cloud credentials, SSH keys, and access to internal systems — extremely valuable for attackers
  • Perceived lower risk: Historical assumptions that macOS is less targeted mean some users and organisations apply less rigorous security controls

ClickFix's Rise as a Primary Delivery Vector

ClickFix has emerged as one of the most effective social engineering techniques of 2025-2026. Its effectiveness stems from:

  • Psychological manipulation: Convincing users they are solving a legitimate technical problem
  • Direct execution: Bypasses browser download warnings and Gatekeeper prompts by having the user manually execute the payload
  • Platform agnostic: Works on Windows, macOS, and Linux by adapting the terminal instructions
  • Low technical barrier: Requires no exploit — relies entirely on user action

Multiple threat groups and malware families have adopted ClickFix as their primary delivery mechanism, including campaigns distributing AsyncRAT, DarkGate, Lumma Stealer, and now Infinity Stealer.

Recommendations for macOS Users

  1. Never run terminal commands from websites: Legitimate browser updates and fixes are never delivered via copy-paste terminal instructions
  2. Be sceptical of browser error popups: Verify any error messages through official browser support channels before acting
  3. Enable Gatekeeper and XProtect: Ensure macOS security features are active and up to date
  4. Use an endpoint security solution: Install a reputable macOS AV/EDR product that can detect behavioural indicators of stealers
  5. Monitor for unusual Terminal activity: Unexpected Terminal processes or outbound connections after a browser warning are red flags
  6. Audit browser saved passwords: Consider a password manager with breach monitoring rather than browser-native password storage

Key Takeaways

  • Infinity Stealer is a new macOS info-stealer delivered via ClickFix social engineering lures
  • The malware is written in Python and packaged using Nuitka to evade detection and complicate analysis
  • ClickFix continues to be a highly effective delivery mechanism — macOS users should treat any browser pop-up instructing terminal command execution with extreme suspicion
  • The targeting of macOS reflects a broader trend of threat actors expanding beyond Windows to reach high-value developer and enterprise Apple users
  • This campaign follows a well-established pattern: ClickFix lure → user-executed terminal command → payload download → stealer execution → data exfiltration

Source: BleepingComputer

#Malware#macOS#ClickFix#Info-Stealer#Python#Nuitka#BleepingComputer#Phishing

Related Articles

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside a WAV audio file using steganographic techniques.

4 min read

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read
Back to all News