New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

FrigidStealer, a sophisticated information-stealing malware that emerged in January 2025, is actively targeting macOS endpoints to steal sensitive user data through deceptive tactics. Unlike traditional malware, FrigidStealer exploits user trust in routine software updates, making it particularly insidious. The malware has raised significant concerns among cybersecurity experts due to its ability to bypass standard security […] The post New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials appeared first on Cyber Security News.

May 17, 2025 - 10:48
 0
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

FrigidStealer, a sophisticated information-stealing malware that emerged in January 2025, is actively targeting macOS endpoints to steal sensitive user data through deceptive tactics.

Unlike traditional malware, FrigidStealer exploits user trust in routine software updates, making it particularly insidious.

The malware has raised significant concerns among cybersecurity experts due to its ability to bypass standard security measures while harvesting valuable personal information from unsuspecting users.

The attack vector relies on social engineering techniques, specifically distributing malicious code via fake browser update pages hosted on compromised websites.

Users are tricked into downloading a malicious disk image file (DMG) that requires manual execution.

Once initiated, the malware bypasses macOS Gatekeeper protections by cleverly prompting users to enter their password via AppleScript, granting it elevated privileges on the system.

Wazuh analysts identified the malware’s sophisticated operational mechanics during their recent investigation of emerging threats to macOS environments.

Their research revealed that FrigidStealer’s financial motivations are potentially linked to the notorious EvilCorp syndicate, underscoring its serious threat to both individual users and enterprises.

The stolen data includes credentials and cryptocurrency wallets, posing significant risks of identity theft and financial fraud.

Upon execution, the malware registers itself as an application named “ddaolimaki-daunito” on the macOS endpoint, with the executable path typically located at “Volumes/Safari Updater/Safari Updater.app.”

This deceptive naming convention further enhances its ability to remain undetected by casual users who might mistake it for legitimate software components.

Persistence Mechanism and Data Exfiltration

FrigidStealer establishes persistence through sophisticated techniques that ensure it remains operational across system restarts.

The malware leverages launchservicesd as a foreground application with bundle ID “com.wails.ddaolimaki-daunito” to maintain its presence on infected systems.

This persistence strategy is particularly effective as it mimics legitimate system processes.

The data exfiltration process involves using Apple Events for unauthorized inter-process communication to target sensitive information.

This technique allows the malware to access browser credentials, filesystem data, and system configuration details without triggering standard security alerts.

A sample of the malware’s execution can be detected through the following command pattern:-

# Detection of FrigidStealer DNS exfiltration

  macOS_mDNSResponder
  (?i)(DNSServiceQueryRecord).*mask\.hash: '(\S+)'.*pid:(\d+).*\((.+)\)
  program_type,hash,pid,process_name

After successfully harvesting credentials and other valuable data, FrigidStealer exfiltrates the stolen information to command-and-control servers through DNS data exfiltration via the mDNSResponder process.

This technique is particularly insidious as it disguises malicious traffic as legitimate DNS queries, making detection challenging through conventional network monitoring tools.

Following successful exfiltration, the malware terminates its main process to eliminate traces of its operation, further complicating forensic analysis.

As this threat continues to evolve, cybersecurity experts recommend implementing comprehensive endpoint protection specifically designed for macOS environments, maintaining vigilance regarding software update prompts, and utilizing specialized detection tools like Wazuh that can identify the unique behavioral patterns associated with FrigidStealer infections.

How SOC Teams Save Time and Effort with ANY.RUN - Live webinar for SOC teams and managers

The post New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials appeared first on Cyber Security News.