Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New FrigidStealer malware targets MacOS users via fake browser updates
Identity

New FrigidStealer malware targets MacOS users via fake browser updates

userBy userFebruary 18, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananThreat Intelligence/Malware

Malware targets MacOS users

Cybersecurity researchers are warning against a new campaign that leverages Web Injects to deliver new Apple MacOS malware known as FrigidStealer.

This activity stems from information stealing on other platforms such as Windows (Lumma Stealer or Deerstealer) and Android (Marcher) that were previously undocumented threat actors known as TA2727.

Ta2727 is “a threat actor who uses fake update theme lures to distribute various malware payloads,” says a report shared with Hacker News.

Cybersecurity

This is one of the newly identified threat activity clusters along with TA2726, and is rated as a malicious traffic delivery system (TDS) operator that facilitates traffic delivery for other threat actors to deliver malware. It’s there. The financially motivated threat actor is believed to have been active since at least September 2022.

According to the enterprise security company, TA2726 acts as the TDS for another threat actor called TA2727 and TA569. TA569 is responsible for the distribution of JavaScript-based loader malware, known as Socgholish (aka FakeUpdates), which often employs browser updates. A legitimate but compromised site.

“TA2726 is financially motivated and works with other financially motivated actors, such as TA569 and TA2727,” the company said. “This means that this actor is most likely responsible for the compromises of the web server or website that leads to injections operated by other threat actors.”

Both TA569 and TA2727 are distributed via websites compromised with malicious JavaScript website injections that mimic browser updates on web browsers such as Google Chrome and Microsoft Edge. They share similarities. What makes the TA2727 different is the use of attack chains that provide different payloads based on the recipient’s geography or device.

If a user visits an infected website in France or the UK on a Windows computer, they are prompted to download the MSI installer file that launches Hijack Loader (also known as Doiloader).

Meanwhile, the same fake update redirection when visiting from an Android device leads to the deployment of bank Trojans that have been detected in the wild for over a decade.

Fake browser updates

That’s not all. As of January 2025, the campaign was updated to target MACOS users outside of North America by redirecting to a fake update page where a new information steeler downloaded the codename FrigidStealer.

FrigidStealer installers, like other MacOS malware, require users to explicitly launch unsigned apps to bypass gatekeeper protection. The built-in MACH-O executable is then run to install the malware.

“The executable was written in GO and was signed ad hoc,” ProofPoint said. “The executable was built with the Wailsio project, which provides content to the user’s browser. This adds to the victim’s social engineering and means that the Chrome or Safari installer is legal.”

FrigidStealer is no different from the various steeler families targeting MACOS systems. Use Applescript to encourage users to enter their system passwords, thereby increasing the privilege to collect files and any kind of sensitive information from web browsers, Apple Notes, and Cryptocurrency-related apps.

Cybersecurity

“Actors use web compromises to provide malware that targets both corporate and consumer users,” the company said. “It makes sense for such web injection to deliver customized malware to recipients, including MAC users, which are not yet common in enterprise environments than Windows.”

This development is another completely undetectable, named Tiny FUD, where DENWP Research’s Tonmoy Jitu leverages name manipulation, dynamic link daemon (dyld) injection, and command-and-control (C2)-based command execution. This is because we revealed details about the MacOS backdoor.

It also follows the emergence of new information steeler malware such as Astral Stealer and Flesh Stealer. Both are designed to collect sensitive information, avoid detection, and maintain the persistence of compromised systems.

“Meat steelers are particularly effective at detecting virtual machine (VM) environments,” FlashPoint said in a recent report. “This will run on a VM to prevent potential forensic analysis and show you an understanding of security research practices.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleXSEM appoints a new commercial director
Next Article UN Human Rights Chief Condemns M23 Rebels of DRC’s “Summary Enforcement” | Conflict News
user
  • Website

Related Posts

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025

North Korea Andariel Hacker Behind US Sanctions Fraudulent IT Worker Scheme

July 9, 2025

How to automate ticket creation, device identification, and threat triage with tines

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

EDF confirms 12.5% ​​shares in Sizewell c

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.