Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

Posted on May 17, 2025May 17, 2025 By CWS

FrigidStealer, a complicated information-stealing malware that emerged in January 2025, is actively concentrating on macOS endpoints to steal delicate person information by misleading ways.

In contrast to conventional malware, FrigidStealer exploits person belief in routine software program updates, making it significantly insidious.

The malware has raised important issues amongst cybersecurity consultants as a result of its means to bypass normal safety measures whereas harvesting useful private info from unsuspecting customers.

The assault vector depends on social engineering strategies, particularly distributing malicious code through faux browser replace pages hosted on compromised web sites.

Customers are tricked into downloading a malicious disk picture file (DMG) that requires guide execution.

As soon as initiated, the malware bypasses macOS Gatekeeper protections by cleverly prompting customers to enter their password through AppleScript, granting it elevated privileges on the system.

Wazuh analysts recognized the malware’s subtle operational mechanics throughout their current investigation of rising threats to macOS environments.

Their analysis revealed that FrigidStealer’s monetary motivations are probably linked to the infamous EvilCorp syndicate, underscoring its critical risk to each particular person customers and enterprises.

The stolen information contains credentials and cryptocurrency wallets, posing important dangers of id theft and monetary fraud.

Upon execution, the malware registers itself as an utility named “ddaolimaki-daunito” on the macOS endpoint, with the executable path usually positioned at “Volumes/Safari Updater/Safari Updater.app.”

This misleading naming conference additional enhances its means to stay undetected by informal customers who would possibly mistake it for legit software program elements.

Persistence Mechanism and Knowledge Exfiltration

FrigidStealer establishes persistence by subtle strategies that guarantee it stays operational throughout system restarts.

The malware leverages launchservicesd as a foreground utility with bundle ID “com.wails.ddaolimaki-daunito” to keep up its presence on contaminated programs.

This persistence technique is especially efficient because it mimics legit system processes.

The information exfiltration course of entails utilizing Apple Occasions for unauthorized inter-process communication to focus on delicate info.

This method permits the malware to entry browser credentials, filesystem information, and system configuration particulars with out triggering normal safety alerts.

A pattern of the malware’s execution might be detected by the next command sample:-

# Detection of FrigidStealer DNS exfiltration

macOS_mDNSResponder
(?i)(DNSServiceQueryRecord).*masks.hash: ‘(S+)’.*pid:(d+).*((.+))
program_type,hash,pid,process_name

After efficiently harvesting credentials and different useful information, FrigidStealer exfiltrates the stolen info to command-and-control servers by DNS information exfiltration through the mDNSResponder course of.

This method is especially insidious because it disguises malicious visitors as legit DNS queries, making detection difficult by typical community monitoring instruments.

Following profitable exfiltration, the malware terminates its predominant course of to get rid of traces of its operation, additional complicating forensic evaluation.

As this risk continues to evolve, cybersecurity consultants advocate implementing complete endpoint safety particularly designed for macOS environments, sustaining vigilance relating to software program replace prompts, and using specialised detection instruments like Wazuh that may establish the distinctive behavioral patterns related to FrigidStealer infections.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Attacking, Credentials, FrigidStealer, Login, macOS, Malware, Steal, Users

Post navigation

Previous Post: Cloud Security Essentials – Protecting Multi-Cloud Environments
Next Post: Guide to Cloud API Security

Related Posts

Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs Cyber Security News
WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data Cyber Security News
Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites Cyber Security News
Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark