Fake CAPTCHA steals crypto from macOS users

- Hackers target crypto users on macOS with a fake CAPTCHA attack.
- The attack leads to the installation of a new infostealer called Infiniti Stealer.
- The malware steals crypto wallet data, credentials, and other data from infected computers.
Crypto users are facing a new security threat via fake Cloudflare CAPTCHA pages. The attack leads to the installation of a new infostealer called Infiniti Stealer built to siphon crypto wallet data from macOS systems.
This means any developer or crypto user who has a MacBook or Mac desktop computer is at risk of being infected by this malware.
ClickFix attack starts macOS system infection
Security researchers from Malwarebytes discovered this campaign. The malware’s operator panel was later exposed, revealing the name, Infinite Stealer.
The infostealer is delivered through a ClickFix attack. A ClickFix attack is classified as a social engineering attack. It tricks users into running a harmful command themselves. Instead of hacking your computer directly, it convinces you to do it for them.
The attack starts with a fake CAPTCHA page from update-check[.]com. The page looks like a Cloudflare human verification page, but it’s not. After clicking the fake CAPTCHA, the user is instructed to open Terminal and paste a command.
The command is not verification. It’s a hidden installer script that downloads and runs the malware on the user’s computer.

The attack works because the user executes the command. It bypasses traditional defenses since there’s no exploit.
Once the command is executed, it connects to a remote server controlled by the attacker that downloads Infiniti Stealer and installs it quietly on the Mac. No pop-ups, no warnings, just silent installation.
Security researchers say it’s difficult to analyze and detect this malware because it’s compiled into a native macOS binary. It’s not just a Python script that can be easily read and understood.
The malware is designed to steal sensitive data from Macs, including crypto wallet data, credentials from browsers and the macOS Keychain, plaintext secrets in developer files, and even screenshots captured during execution.
It also checks if it’s running in an analysis environment to avoid detection, and it sends stolen data to the attacker’s server. Telegram notifications are sent to the attacker when data extraction is complete, and captured credentials are queued for server-side password cracking.
ClickFix attacks are common on Windows, but now hackers are adapting them for Apple machines. MacOS systems are no longer considered safe from malware. Crypto users should be cautious when browsing the web and should never paste commands into Terminal from untrusted sources.
Crypto personal wallets compromise rise sharply
This is not the first sophisticated attack targeting crypto users on macOS. Cryptopolitan reported in March about GhostClaw, a new macOS malware that steals private keys, wallet access, and other sensitive data.
The malware is listed on npm, a popular package manager for JavaScript. It posed as a real OpenClaw tool but instead ran a multi-stage attack. A total of 178 developers downloaded the malicious package before it was removed from the registry.
A total of $3.4 billion was stolen from the cryptocurrency industry in 2025.
“Personal wallet compromises have grown substantially, increasing from just 7.3% of total stolen value in 2022 to 44% in 2024,” according to a report from blockchain security firm Chainalysis.
The magnitude of hacks on personal wallets would have reached 37% in 2025 if it weren’t for the outsized impact of the Bybit attack.
Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free.
Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Randa Moses
Randa is a writer and editor specializing in technology. She graduated from the University of Bradford with a degree in Electrical and Electronics Engineering. She has worked at Forward Protocol, Amazix, and Cryptosomniac.
CRASH COURSE
- Which cryptocurrencies can make you money
- How to boost your security with a wallet (and which ones are actually worth using)
- Little-known investment strategies that the pros use
- How to get started investing in crypto (which exchanges to use, the best crypto to buy etc)














