BasedApparel.com, a merchandise website co-created by Kash Patel, was taken offline on Friday in 2026 after it was found tricking macOS visitors into installing infostealer malware. This incident revealed a critical tension: a site linked to a national security figure fell victim to common cybercriminal tactics, yet the attack vectors were sophisticated enough to target sensitive user data. Even seemingly simple e-commerce sites, regardless of public association, remain vulnerable to advanced cyberattacks, demanding robust security and user vigilance.
How the Attack Unfolded
The attack leveraged a deceptive 'I am not a robot: Cloudflare Verification ID: 801470' prompt to trick macOS users. This social engineering tactic led visitors to manually execute a shell script from a hacker-controlled domain, as reported by pcmag. The script then installed an 'infostealer' malware designed to pilfer login credentials, browser cookies, cryptocurrency information, Apple Notes data, and passwords (Straight Arrow News). This method exploited user trust in common security prompts, demonstrating how even technically aware users can be manipulated into compromising their own systems.
Dual Threat: Skimmers and Shutdown
Beyond the infostealer, a security researcher also found a payment skimmer on BasedApparel.com's checkout page, designed to steal credit card information (Straight Arrow News). The site also hosted a 'ClickFix'-style attack (pcmag). This combination of an infostealer and a payment skimmer illustrates a sophisticated, multi-pronged attack aimed at maximizing data exfiltration, targeting both financial and diverse personal data. The comprehensive breach ultimately rendered the website unreachable and led to its shutdown (TechCrunch).
Context of Cyber Vulnerability
The social engineering tactic, disguised as a Cloudflare verification, proves that even security-conscious users are vulnerable when familiar trust signals are weaponized (pcmag). This incident exposes a fundamental weakness in user trust models. The combination of an infostealer and a payment skimmer confirms that cybercriminals now favor multi-layered compromises to maximize data exfiltration from a single breach (Straight Arrow News). While initial reports from TechCrunch and Straight Arrow News incorrectly identified Kash Patel as 'FBI director', pcmag accurately stated the site was 'co-created by Kash Patel'. This clarification reinforces that high-profile associations do not guarantee cybersecurity resilience. Any online platform, regardless of its public profile, becomes a target if it holds valuable data or user vulnerabilities.
What happened to Kash Patel's clothing brand website?
Kash Patel's BasedApparel.com experienced a cyberattack in 2026. The attackers deployed both an infostealer malware, targeting macOS users with a deceptive Cloudflare verification, and a payment skimmer on the checkout page to steal credit card information. The website was subsequently taken offline.
This incident appears likely to accelerate the adoption of advanced, multi-layered security protocols across all e-commerce platforms, especially those with public profiles, to counter increasingly sophisticated and targeted threats.










