Fake Browser Updates Are Used by Mac OS Users With New FrigidStealer Malware.

Feb 18, 2025Ravie LakshmananThreat Intelligence / Malware

Researchers in security are in the dark about a recent campaign that uses web injections to give a brand-new FrigidStealer Apple macOS malware.

The information stealers for other platforms like Windows ( or ) and Android ( ) have been linked to a previously unidentified threat actor known as TA2727.

The Proofpoint Threat Research Team described TA2727 as a” risk artist that uses fake up-date themed lures to deliver a variety of malware payloads” in a report that was released by The Hacker News.

Along with TA2726, which is deemed to be a malicious traffic distribution system ( TDS ) operator that facilitates traffic distribution for other threat actors, it belongs to one of the recently identified threat activity clusters. The risk artist with a financial bent is said to have been engaged since at least September 2022.

TA2726, per the enterprise security firm, acts as a TDS for TA2727 and another threat actor called , which is responsible for the distribution of a JavaScript-based loader malware referred to as (aka FakeUpdates ) that often masquerades as a browser update on legitimate-but-compromised sites.

“TA2726 is economically encouraged and works with other economically inspired actors such as TA569 and TA2727”, the organization noted. That means that this actor is most likely to be accountable for the website or web server compromises that result in injects carried out by another threat actors.

Similar to each other, TA569 and TA2727 are distributed via websites that have been hacked by malicious JavaScript web injections that resemble computer updates for popular browsers like Google Chrome and Microsoft Edge. The use of invasion chains that serve various payloads based on consumers ‘ geography or device is where TA2727 stands out.

If a users visit an infected webpage in France or the U. K. on a Windows computer, they are prompted to download an MSI software file that launches (aka DOILoader ), which, in turn, loads Lumma Stealer.

On the other hand, when a false update redirect is displayed on an Android device, it is used to install a banking trojan known as , which has been found in the wild for more than ten years.

That’s not all. The strategy has been updated to include mac users residing outside of North America who have access to a false update website that downloaded a brand-new information stealer codenamed FrigidStealer as of January 2025.

The FrigidStealer setup, like other macOS malware, requires users to directly establish the anonymous app to pass , following which an embedded Mach-O executable is run to place the malware.

” The downloadable was written in Go, and was ad-hoc signed”, Proofpoint said. ” The file was built with the WailsIO initiative, which renders material in the user’s computer. This further strengthens the victim’s social engineering, implying that the Chrome or Safari setup was legitimate.

FrigidStealer is comparable to the numerous mac stealer families. It uses AppleScript to ask a customer for their program password, giving it more authority to extract files and other sensitive data from web browsers, Apple Notes, and other crypto-related apps.

According to the company,” Stars are using web concessions to deliver malware that targets both business and client users.” It is reasonable to assume that such web introduces may infect Mac users with specially designed malware, which are still less prevalent in enterprise settings than Windows.

The development comes as Denwp Research’s Tonmoy Jitu details of another fully undetectable macOS backdoor named Tiny FUD that leverages name manipulation, dynamic link daemon ( DYLD ) injection, and command-and-control ( C2 ) based command execution.

It also follows the development of new data stealer malware, such as and , which are both designed to evade detection, maintain persistence, and gather sensitive info.

” Flesh Stealer is particularly effective in detecting virtual machine (VM ) environments”, Flashpoint in a recent report. It may refrain from running on virtual machines, demonstrating a knowledge of safety research methods, and preventing any possible forensic analysis.

Found this post interesting? To read more unique information we post, follow us on and Twitter.

Leave a Comment