Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

Posted on May 17, 2025May 17, 2025 By CWS

FrigidStealer, a complicated information-stealing malware that emerged in January 2025, is actively concentrating on macOS endpoints to steal delicate person information by misleading ways.

In contrast to conventional malware, FrigidStealer exploits person belief in routine software program updates, making it significantly insidious.

The malware has raised important issues amongst cybersecurity consultants as a result of its means to bypass normal safety measures whereas harvesting useful private info from unsuspecting customers.

The assault vector depends on social engineering strategies, particularly distributing malicious code through faux browser replace pages hosted on compromised web sites.

Customers are tricked into downloading a malicious disk picture file (DMG) that requires guide execution.

As soon as initiated, the malware bypasses macOS Gatekeeper protections by cleverly prompting customers to enter their password through AppleScript, granting it elevated privileges on the system.

Wazuh analysts recognized the malware’s subtle operational mechanics throughout their current investigation of rising threats to macOS environments.

Their analysis revealed that FrigidStealer’s monetary motivations are probably linked to the infamous EvilCorp syndicate, underscoring its critical risk to each particular person customers and enterprises.

The stolen information contains credentials and cryptocurrency wallets, posing important dangers of id theft and monetary fraud.

Upon execution, the malware registers itself as an utility named “ddaolimaki-daunito” on the macOS endpoint, with the executable path usually positioned at “Volumes/Safari Updater/Safari Updater.app.”

This misleading naming conference additional enhances its means to stay undetected by informal customers who would possibly mistake it for legit software program elements.

Persistence Mechanism and Knowledge Exfiltration

FrigidStealer establishes persistence by subtle strategies that guarantee it stays operational throughout system restarts.

The malware leverages launchservicesd as a foreground utility with bundle ID “com.wails.ddaolimaki-daunito” to keep up its presence on contaminated programs.

This persistence technique is especially efficient because it mimics legit system processes.

The information exfiltration course of entails utilizing Apple Occasions for unauthorized inter-process communication to focus on delicate info.

This method permits the malware to entry browser credentials, filesystem information, and system configuration particulars with out triggering normal safety alerts.

A pattern of the malware’s execution might be detected by the next command sample:-

# Detection of FrigidStealer DNS exfiltration

macOS_mDNSResponder
(?i)(DNSServiceQueryRecord).*masks.hash: ‘(S+)’.*pid:(d+).*((.+))
program_type,hash,pid,process_name

After efficiently harvesting credentials and different useful information, FrigidStealer exfiltrates the stolen info to command-and-control servers by DNS information exfiltration through the mDNSResponder course of.

This method is especially insidious because it disguises malicious visitors as legit DNS queries, making detection difficult by typical community monitoring instruments.

Following profitable exfiltration, the malware terminates its predominant course of to get rid of traces of its operation, additional complicating forensic evaluation.

As this risk continues to evolve, cybersecurity consultants advocate implementing complete endpoint safety particularly designed for macOS environments, sustaining vigilance relating to software program replace prompts, and using specialised detection instruments like Wazuh that may establish the distinctive behavioral patterns related to FrigidStealer infections.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Attacking, Credentials, FrigidStealer, Login, macOS, Malware, Steal, Users

Post navigation

Previous Post: Cloud Security Essentials – Protecting Multi-Cloud Environments
Next Post: Guide to Cloud API Security

Related Posts

An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets Cyber Security News
UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News