Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

Posted on May 17, 2025May 17, 2025 By CWS

FrigidStealer, a complicated information-stealing malware that emerged in January 2025, is actively concentrating on macOS endpoints to steal delicate person information by misleading ways.

In contrast to conventional malware, FrigidStealer exploits person belief in routine software program updates, making it significantly insidious.

The malware has raised important issues amongst cybersecurity consultants as a result of its means to bypass normal safety measures whereas harvesting useful private info from unsuspecting customers.

The assault vector depends on social engineering strategies, particularly distributing malicious code through faux browser replace pages hosted on compromised web sites.

Customers are tricked into downloading a malicious disk picture file (DMG) that requires guide execution.

As soon as initiated, the malware bypasses macOS Gatekeeper protections by cleverly prompting customers to enter their password through AppleScript, granting it elevated privileges on the system.

Wazuh analysts recognized the malware’s subtle operational mechanics throughout their current investigation of rising threats to macOS environments.

Their analysis revealed that FrigidStealer’s monetary motivations are probably linked to the infamous EvilCorp syndicate, underscoring its critical risk to each particular person customers and enterprises.

The stolen information contains credentials and cryptocurrency wallets, posing important dangers of id theft and monetary fraud.

Upon execution, the malware registers itself as an utility named “ddaolimaki-daunito” on the macOS endpoint, with the executable path usually positioned at “Volumes/Safari Updater/Safari Updater.app.”

This misleading naming conference additional enhances its means to stay undetected by informal customers who would possibly mistake it for legit software program elements.

Persistence Mechanism and Knowledge Exfiltration

FrigidStealer establishes persistence by subtle strategies that guarantee it stays operational throughout system restarts.

The malware leverages launchservicesd as a foreground utility with bundle ID “com.wails.ddaolimaki-daunito” to keep up its presence on contaminated programs.

This persistence technique is especially efficient because it mimics legit system processes.

The information exfiltration course of entails utilizing Apple Occasions for unauthorized inter-process communication to focus on delicate info.

This method permits the malware to entry browser credentials, filesystem information, and system configuration particulars with out triggering normal safety alerts.

A pattern of the malware’s execution might be detected by the next command sample:-

# Detection of FrigidStealer DNS exfiltration

macOS_mDNSResponder
(?i)(DNSServiceQueryRecord).*masks.hash: ‘(S+)’.*pid:(d+).*((.+))
program_type,hash,pid,process_name

After efficiently harvesting credentials and different useful information, FrigidStealer exfiltrates the stolen info to command-and-control servers by DNS information exfiltration through the mDNSResponder course of.

This method is especially insidious because it disguises malicious visitors as legit DNS queries, making detection difficult by typical community monitoring instruments.

Following profitable exfiltration, the malware terminates its predominant course of to get rid of traces of its operation, additional complicating forensic evaluation.

As this risk continues to evolve, cybersecurity consultants advocate implementing complete endpoint safety particularly designed for macOS environments, sustaining vigilance relating to software program replace prompts, and using specialised detection instruments like Wazuh that may establish the distinctive behavioral patterns related to FrigidStealer infections.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Attacking, Credentials, FrigidStealer, Login, macOS, Malware, Steal, Users

Post navigation

Previous Post: Cloud Security Essentials – Protecting Multi-Cloud Environments
Next Post: Guide to Cloud API Security

Related Posts

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News