Web Analytics
Cryptopolitan
2026-03-29 13:50:47

Hackers target crypto users with fake CAPTCHA

Crypto users are facing a new security threat via fake Cloudflare CAPTCHA pages. The attack leads to the installation of a new infostealer called Infiniti Stealer built to siphon crypto wallet data from macOS systems. This means any developer or crypto user who has a MacBook or Mac desktop computer is at risk of being infected by this malware. ClickFix attack starts macOS system infection Security researchers from Malwarebytes discovered this campaign. The malware’s operator panel was later exposed, revealing the name, Infinite Stealer. The infostealer is delivered through a ClickFix attack. A ClickFix attack is classified as a social engineering attack. It tricks users into running a harmful command themselves. Instead of hacking your computer directly, it convinces you to do it for them. The attack starts with a fake CAPTCHA page from update-check[.]com. The page looks like a Cloudflare human verification page, but it’s not. After clicking the fake CAPTCHA, the user is instructed to open Terminal and paste a command. The command is not verification. It’s a hidden installer script that downloads and runs the malware on the user’s computer. Fake Cloudflare captcha that tricks users into running a malicious command, installing the infostealer. Source: Malwarebytes . The attack works because the user executes the command. It bypasses traditional defenses since there’s no exploit. Once the command is executed, it connects to a remote server controlled by the attacker that downloads Infiniti Stealer and installs it quietly on the Mac. No pop-ups, no warnings, just silent installation. Security researchers say it’s difficult to analyze and detect this malware because it’s compiled into a native macOS binary. It’s not just a Python script that can be easily read and understood. The malware is designed to steal sensitive data from Macs, including crypto wallet data, credentials from browsers and the macOS Keychain, plaintext secrets in developer files, and even screenshots captured during execution. It also checks if it’s running in an analysis environment to avoid detection, and it sends stolen data to the attacker’s server. Telegram notifications are sent to the attacker when data extraction is complete, and captured credentials are queued for server-side password cracking. ClickFix attacks are common on Windows, but now hackers are adapting them for Apple machines. MacOS systems are no longer considered safe from malware. Crypto users should be cautious when browsing the web and should never paste commands into Terminal from untrusted sources. Crypto personal wallets compromise rise sharply This is not the first sophisticated attack targeting crypto users on macOS. Cryptopolitan reported in March about GhostClaw , a new macOS malware that steals private keys, wallet access, and other sensitive data. The malware is listed on npm, a popular package manager for JavaScript. It posed as a real OpenClaw tool but instead ran a multi-stage attack. A total of 178 developers downloaded the malicious package before it was removed from the registry. A total of $3.4 billion was stolen from the cryptocurrency industry in 2025. “Personal wallet compromises have grown substantially, increasing from just 7.3% of total stolen value in 2022 to 44% in 2024,” according to a report from blockchain security firm Chainalysis. The magnitude of hacks on personal wallets would have reached 37% in 2025 if it weren’t for the outsized impact of the Bybit attack. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约