Cloudflare ClickFix Malware Attack Exposes Macs to Infiniti Stealer
Malware Researchers Discover Novel Clickjacking Technique Dubbed ClickFix
Malwarebytes researchers have uncovered a sophisticated clickjacking technique called ClickFix, which uses a Cloudflare-themed verification page to distribute a Python-based information stealer targeting macOS users.
ClickFix Campaign Details
- The attack begins with a fake CAPTCHA page presenting a legitimate-looking Cloudflare human verification page, asking victims to paste and execute a command in Terminal.
- This social engineering tactic exploits user trust, encouraging them to run a seemingly harmless command.
- The command executed fetches a Bash script from a remote server, which decodes an embedded payload, writes it to a temporary folder, removes the quarantine flag, and executes it.
Infiniti Stealer Malware
The final payload is the Infiniti Stealer malware, a Python-based information stealer that targets:
- Browser credentials
- Keychain information
- Cryptocurrency wallets
- Secrets stored in developer files
- Screenshots captured during execution
Attack Mechanism
Evading Detection
The Infiniti Stealer employs randomized execution delays and checks if the system is a known analysis environment to evade detection.
Implications
Malwarebytes notes that Infiniti Stealer demonstrates how techniques initially used on Windows systems, such as ClickFix, are now being adapted to target Mac users. The use of Python compilation into native binaries makes the malware harder to detect and analyze.
As this approach becomes more prevalent, it may lead to further adaptations in future attacks, emphasizing the importance of staying vigilant and regularly updating software and systems to prevent potential vulnerabilities.
