Security researchers have identified a new macOS information stealer called Infiniti Stealer, which extracts sensitive information from Mac users using a social engineering tactic known as ClickFix. This method involves a counterfeit Cloudflare human verification page that prompts users to enter a command in their Mac Terminal, allowing the malware to bypass security measures. The infection process consists of three stages:
1. A Bash dropper script downloads and decodes a hidden payload.
2. A Nuitka loader, designed for Apple Silicon Macs, complicates detection by compiling Python code into a native application.
3. The final payload, Infiniti Stealer, harvests personal data such as browser passwords, macOS Keychain entries, cryptocurrency wallets, and captures screenshots.
Indicators of Compromise (IOCs) associated with Infiniti Stealer include:
- MD5 Dropper: da73e42d1f9746065f061a6e85e28f0c
- SHA256 Stage-3: 1e63be724bf651bb17bcf181d11bacfabef6a6360dcdfda945d6389e80f2b958
- C2 Domain: update-check[.]com
- C2 URL: https://update-check[.]com/m/7d8df27d95d9
- Panel: Infiniti-stealer[.]com
- Packer Magic: 4b 41 59 28 b5 2f fd (KAY + zstd)
- Debug Log: /tmp/.bs_debug.log