social engineering

Tech Optimizer
March 30, 2026
Security researchers have identified a new macOS information stealer called Infiniti Stealer, which extracts sensitive information from Mac users using a social engineering tactic known as ClickFix. This method involves a counterfeit Cloudflare human verification page that prompts users to enter a command in their Mac Terminal, allowing the malware to bypass security measures. The infection process consists of three stages: 1. A Bash dropper script downloads and decodes a hidden payload. 2. A Nuitka loader, designed for Apple Silicon Macs, complicates detection by compiling Python code into a native application. 3. The final payload, Infiniti Stealer, harvests personal data such as browser passwords, macOS Keychain entries, cryptocurrency wallets, and captures screenshots. Indicators of Compromise (IOCs) associated with Infiniti Stealer include: - MD5 Dropper: da73e42d1f9746065f061a6e85e28f0c - SHA256 Stage-3: 1e63be724bf651bb17bcf181d11bacfabef6a6360dcdfda945d6389e80f2b958 - C2 Domain: update-check[.]com - C2 URL: https://update-check[.]com/m/7d8df27d95d9 - Panel: Infiniti-stealer[.]com - Packer Magic: 4b 41 59 28 b5 2f fd (KAY + zstd) - Debug Log: /tmp/.bs_debug.log
AppWizard
March 20, 2026
Google has introduced a new sideloading process for Android that includes a 24-hour waiting period and multiple steps for installing apps from unverified developers. The steps are as follows: 1. Enable Developer Mode. 2. Confirm you’re not being coerced into disabling device protections. 3. Restart your phone. 4. Wait 24 hours. 5. Re-authenticate using biometric authentication or a PIN. 6. Install the app, with a warning about its unverified status. This change aims to enhance user safety and protect less experienced users from scams. The new rules will take effect in August, primarily affecting users who sideload apps from third-party sources, while those using the Play Store will not see changes. Google is also requiring app developers to verify their identities to reduce the risk of malicious applications. Exceptions exist for limited distribution apps that can be shared without full verification.
Search