Malware & RansomwareHIGH

Infiniti Stealer - New macOS Infostealer Emerges

MWMalwarebytes Labs
Infiniti StealermacOSClickFixNuitkamalware
🎯

Basically, a new malware tricks Mac users into running commands that steal their data.

Quick Summary

A new macOS malware called Infiniti Stealer tricks users into executing malicious commands. This poses serious risks to sensitive data on Macs. Stay safe by avoiding suspicious commands.

What Happened

A new macOS infostealer has emerged, initially tracked as NukeChain but now identified as Infiniti Stealer. This malware targets sensitive data from Mac systems using a technique called ClickFix. Instead of exploiting software vulnerabilities, it deceives users into executing malicious commands themselves. The malware's delivery method involves a fake CAPTCHA page that mimics a legitimate verification process. This approach is particularly dangerous because it bypasses traditional security measures.

The malware is written in Python and compiled using Nuitka, which converts Python code into a native macOS binary. This compilation method increases the difficulty of detection and analysis, making it a unique threat in the macOS landscape. As the first documented campaign to use ClickFix with a Nuitka-compiled Python stealer, Infiniti Stealer represents a significant evolution in malware tactics targeting Mac users.

Who's Being Targeted

Infiniti Stealer primarily targets macOS users who may believe their systems are less vulnerable to malware. This perception is changing as more sophisticated attacks emerge. The malware spreads via a deceptive page hosted on update-check[.]com, which tricks users into running a command in their Terminal. By convincing users to execute commands directly, the malware effectively circumvents many conventional defenses.

The technique of social engineering used here is reminiscent of methods previously seen on Windows systems. However, the adaptation for macOS indicates that attackers are broadening their scope, recognizing the growing user base of Apple devices. The potential for widespread impact is significant, as many users may not be aware of the risks associated with running commands from untrusted sources.

Signs of Infection

Once executed, the malware initiates a multi-stage infection process. The first stage involves a Bash dropper that decodes and executes a second-stage binary, which is a Nuitka-compiled executable. This binary is designed to gather a wide range of sensitive information, including:

  • Credentials from browsers like Chrome and Firefox
  • macOS Keychain entries
  • Cryptocurrency wallet information
  • Plaintext secrets from developer files
  • Screenshots captured during execution

The malware also incorporates checks to avoid detection by running in known analysis environments, further complicating efforts to identify and mitigate its effects. Users may not notice anything unusual until sensitive information has already been exfiltrated.

How to Protect Yourself

If you suspect that your Mac may have been compromised by Infiniti Stealer, immediate action is crucial. Here are some recommended steps:

  1. Stop using the device for sensitive activities like banking or accessing work accounts.
  2. Change your passwords on a clean device, starting with critical accounts such as email and banking.
  3. Revoke access to active sessions and API tokens.
  4. Check for suspicious files in directories like /tmp and ~/Library/LaunchAgents.
  5. Run a full malware scan using a reputable tool like Malwarebytes to detect and remove any malicious software.

It's essential to remember that no legitimate CAPTCHA will ever require you to paste commands into your Terminal. Stay vigilant and avoid executing any commands from untrusted websites to protect your data.

🔒 Pro insight: The use of ClickFix on macOS signifies a shift in attacker tactics, indicating that Apple users are increasingly becoming prime targets for sophisticated malware.

Original article from

Malwarebytes Labs

Read Full Article

Related Pings

HIGHMalware & Ransomware

BPFdoor - Stealth Malware Targets Telecom Networks Worldwide

BPFdoor, a stealthy backdoor, targets telecom networks globally. This malware operates deep within the OS kernel, complicating detection efforts. Security teams must enhance their visibility to combat this threat effectively.

SC Media·
HIGHMalware & Ransomware

VoidLink Rootkit - Advanced Threat to Linux Systems Emerges

The VoidLink rootkit has emerged as a serious threat to Linux systems. This advanced malware uses innovative techniques to hide itself, making detection difficult. Organizations must take action to safeguard their systems against this sophisticated threat.

Cyber Security News·
HIGHMalware & Ransomware

RedLine Malware - Developer Extradited, Faces 30 Years in Prison

Hambardzum Minasyan, a key figure behind RedLine malware, has been extradited to the U.S. He faces serious charges that could lead to a lengthy prison sentence. This case highlights the ongoing battle against cybercrime and the impact of malware on global security.

The Record·
HIGHMalware & Ransomware

Malware Alert - Elastic Security Labs Uncovers BRUSHWORM

Elastic Security Labs has discovered two new malware types, BRUSHWORM and BRUSHLOGGER, targeting a South Asian financial institution. These threats use USB drives to spread and steal sensitive data. Organizations must act swiftly to mitigate risks and protect their data.

Elastic Security Labs·
HIGHMalware & Ransomware

GhostClaw - New AI Malware Targets macOS for Credential Theft

GhostClaw malware is targeting macOS users through fake GitHub repositories, stealing credentials via social engineering. Developers must verify source integrity to stay safe.

Cyber Security News·
HIGHMalware & Ransomware

Malware Discovered in LiteLLM - Major Security Breach Alert

LiteLLM, a popular AI tool, was infected by malware that stole user credentials. Millions of users are at risk, raising serious security concerns. The developers are actively investigating the breach and working on solutions.

TechCrunch Security·