Has anyone been able to successfully replicate copying and pasting ClickFix/TerminalFix/*Fix commands into macOS Terminal to trigger this new-fangled malware warning? I have attempted numerous commands, from base64-encoded content to osascripts mimicking macOS infostealer prompts to cURL commands downloading remote content. I even replicated the command documented in the Toms Guide article using the same tool in the same browser and it ran flawlessly in Terminal with no popup. And yes, I’m running Tahoe 26.4 on an M3. I’d like to think this would be a useful ‘stop-and-think’ mitigation but I can’t even consistently trigger it. And, per usual, Apple is tight-lipped on HOW they are detecting malicious commands so it’s likely to remain a black box mitigation. And yeah, I get it, the end user can just click right through the warning via a sneaky social engineering prompt. My goal was to try and build out detection logic to ID when a user gets hit with a prompt so I can at least investigate what the user tried to do and dig deeper into the threat. Since theoretically the user won’t run the command, it won’t get logged in SIEM/EDR tools. I need to rely on other mechanisms for detecting the paste event.

https://www.tomsguide.com/computing/online-security/i-tried-apples-new-security-feature-in-macos-that-warns-you-about-potential-clickfix-attacks-and-windows-should-take-note?utm_source=flipboard&utm_medium=activitypub

#macos #clickfix #terminalfix #threatintel #pastejacking #detectionengineering #threathunting

I put Apple’s new macOS ClickFix warnings to the test and they actually worked — now I want them on Windows too

New warning stops you before you potentially paste something dangerous

Tom's Guide

Punto Informatico: Attacco ClickFix: Apple avvisa gli utenti con macOS 26.4

Apple ha aggiunto in macOS Tahoe 26.4 una funzionalità che protegge gli utenti contro gli attacchi ClickFix (viene mostrato un avviso di pericolo).
The post Attacco ClickFix: Apple avvisa gli utenti con macOS 26.4 appeared first on Punto Informatico.

ClickFix Attack: Apple warns users with macOS 26.4

Apple has added a feature in macOS Tahoe 26.4 that protects users against ClickFix attacks (a warning is displayed).
The post ClickFix Attack: Apple warns users with macOS 26.4 appeared first on Punto Informatico.

#ClickFixAttack #Apple #Tahoe #ClickFix #first #PuntoInformatico

https://www.punto-informatico.it/attacco-clickfix-apple-avvisa-utenti-macos-26-4/

Attacco ClickFix: Apple avvisa gli utenti con macOS 26.4

Apple ha aggiunto in macOS Tahoe 26.4 una funzionalità che protegge gli utenti contro gli attacchi ClickFix (viene mostrato un avviso di pericolo).

Punto Informatico

Apple added an attempt for a warning in macOS 26.4 for ClickFix attacks in Terminal.app

https://9to5mac.com/2026/03/25/macos-26-4-has-new-terminal-popup-warning-when-pasting-commands/
- - -
Apple a ajouté une tentative davertissement dans macOS 26.4 pour les attaques ClickFix dans l’app Terminal

https://www.macg.co/macos/2026/03/macos-264-ajoute-un-avertissement-au-moment-de-copier-une-commande-inconnue-dans-le-terminal-307647

#Apple #macOS #ClickFix #InfoSec #InformationSecurity #Cybersécurité

macOS 26.4 has new Terminal popup warning when pasting commands - 9to5Mac

macOS Tahoe 26.4 users have discovered that the update adds a new Terminal security popup when you first try to paste in commands.

9to5Mac
macOS 26.4 Introduces New Security Feature for Terminal Commands

macOS Tahoe 26.4 introduces a new security feature that warns Mac users if they paste certain commands in the Terminal app that may be harmful. For...

MacRumors
New Infinity Stealer malware grabs macOS data via ClickFix lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler.

BleepingComputer

Punto Informatico: Infiniti Stealer: nuovo malware per macOS con ClickFix

Infiniti Stealer è un nuovo malware per macOS che viene distribuito con la tecnica ClickFix e permette di rubare molti dati sensibili dal dispositivo.
The post Infiniti Stealer: nuovo malware per macOS con ClickFix appeared first on Punto Informatico.

Infiniti Stealer: New macOS Malware Using ClickFix

Infiniti Stealer is a new malware for macOS that is distributed using the ClickFix technique and allows the theft of many sensitive data from the device.
The post Infiniti Stealer: new malware for macOS with ClickFix appeared first on Punto Informatico.

#Infiniti #NewmacOSMalware #ClickFix #first #PuntoInformatico

https://www.punto-informatico.it/infiniti-stealer-nuovo-malware-per-macos-clickfix/

Infiniti Stealer: nuovo malware per macOS con ClickFix

Infiniti Stealer è un nuovo malware per macOS che viene distribuito con la tecnica ClickFix e permette di rubare molti dati sensibili dal dispositivo.

Punto Informatico
New macOS Infinity Stealer uses Nuitka Python payload and ClickFix

Infinity Stealer targets macOS via fake Cloudflare CAPTCHA, using Nuitka; first such campaign per Malwarebytes.

Security Affairs

Angrebene var oprindeligt rettet mod Windows, men blev sidste år udvidet til også at omfatte varianter til macOS og #Linux

#ClickFix -angreb rettet mod macOS var særligt udbredte mod slutningen af 2025.

Det er i dag en af de mest udbredte metoder til distribution af malware

Sikkerheds-firmaet Huntress oplyser, at over halvdelen af de malware-hændelser, de registrerede sidste år, stammede fra en ClickFix-relateret distributions-kilde
https://linuxsecurity.com/features/clickfix-attacks-targeting-linux-systems

https://www.huntress.com/press-release/huntress-cyber-threat-report-exposes-the-playbook-for-organized-cybercrime

APT36: ClickFix Campaign Targets Linux Systems - Evolving Threat Landscape

APT36's ClickFix campaign targets Linux systems, showcasing their evolving threat landscape. Cybersecurity measures are essential.

Linux Security

📢 Infiniti Stealer : nouvel infostealer macOS combinant ClickFix et Python compilé avec Nuitka
📝 ## 🔍 Contexte

Publié le 28 mars 2026 par Stefan Dasic su...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-28-infiniti-stealer-nouvel-infostealer-macos-combinant-clickfix-et-python-compile-avec-nuitka/
🌐 source : https://www.malwarebytes.com/fr/blog/threat-intel/2026/03/infiniti-stealer-a-new-macos-infostealer-using-clickfix-and-python-nuitka
#CAPTCHA #ClickFix #Cyberveille

Infiniti Stealer : nouvel infostealer macOS combinant ClickFix et Python compilé avec Nuitka

🔍 Contexte Publié le 28 mars 2026 par Stefan Dasic sur le blog Malwarebytes, cet article présente la découverte d’un nouvel infostealer macOS initialement nommé NukeChain, puis renommé Infiniti Stealer après la divulgation publique de son panneau de contrôle. Il s’agit, selon les auteurs, de la première campagne macOS documentée combinant la technique ClickFix et un stealer Python compilé avec Nuitka. 🎯 Vecteur d’infection : ClickFix via fausse page CAPTCHA L’infection débute sur le domaine update-check[.]com, qui affiche une réplique de page de vérification humaine Cloudflare. L’utilisateur est invité à :

CyberVeille

Beware CAPTCHA Scam

Fake "I'm not a robot" prompt tricks you. Don't press Win+R for ANY verification EVER!

Real CAPTCHA never asks to run commands or paste code. If "extra verification" has keyboard steps close the tab IMMEDIATELY! Stay safe!

#CyberSecurity #ScamAlert #ClickFix