Web Analytics
Cryptopolitan
2026-03-29 13:50:47

Hackers target crypto users with fake CAPTCHA

Crypto users are facing a new security threat via fake Cloudflare CAPTCHA pages. The attack leads to the installation of a new infostealer called Infiniti Stealer built to siphon crypto wallet data from macOS systems. This means any developer or crypto user who has a MacBook or Mac desktop computer is at risk of being infected by this malware. ClickFix attack starts macOS system infection Security researchers from Malwarebytes discovered this campaign. The malware’s operator panel was later exposed, revealing the name, Infinite Stealer. The infostealer is delivered through a ClickFix attack. A ClickFix attack is classified as a social engineering attack. It tricks users into running a harmful command themselves. Instead of hacking your computer directly, it convinces you to do it for them. The attack starts with a fake CAPTCHA page from update-check[.]com. The page looks like a Cloudflare human verification page, but it’s not. After clicking the fake CAPTCHA, the user is instructed to open Terminal and paste a command. The command is not verification. It’s a hidden installer script that downloads and runs the malware on the user’s computer. Fake Cloudflare captcha that tricks users into running a malicious command, installing the infostealer. Source: Malwarebytes . The attack works because the user executes the command. It bypasses traditional defenses since there’s no exploit. Once the command is executed, it connects to a remote server controlled by the attacker that downloads Infiniti Stealer and installs it quietly on the Mac. No pop-ups, no warnings, just silent installation. Security researchers say it’s difficult to analyze and detect this malware because it’s compiled into a native macOS binary. It’s not just a Python script that can be easily read and understood. The malware is designed to steal sensitive data from Macs, including crypto wallet data, credentials from browsers and the macOS Keychain, plaintext secrets in developer files, and even screenshots captured during execution. It also checks if it’s running in an analysis environment to avoid detection, and it sends stolen data to the attacker’s server. Telegram notifications are sent to the attacker when data extraction is complete, and captured credentials are queued for server-side password cracking. ClickFix attacks are common on Windows, but now hackers are adapting them for Apple machines. MacOS systems are no longer considered safe from malware. Crypto users should be cautious when browsing the web and should never paste commands into Terminal from untrusted sources. Crypto personal wallets compromise rise sharply This is not the first sophisticated attack targeting crypto users on macOS. Cryptopolitan reported in March about GhostClaw , a new macOS malware that steals private keys, wallet access, and other sensitive data. The malware is listed on npm, a popular package manager for JavaScript. It posed as a real OpenClaw tool but instead ran a multi-stage attack. A total of 178 developers downloaded the malicious package before it was removed from the registry. A total of $3.4 billion was stolen from the cryptocurrency industry in 2025. “Personal wallet compromises have grown substantially, increasing from just 7.3% of total stolen value in 2022 to 44% in 2024,” according to a report from blockchain security firm Chainalysis. The magnitude of hacks on personal wallets would have reached 37% in 2025 if it weren’t for the outsized impact of the Bybit attack. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.