SELECT LANGUAGE BELOW

New malware exploits fake updates to steal data

Windows has always been a favorite target for hackers, but it seems they understand how to actively target Macs. We've seen an amazing rise Malware affecting Mac computerssteal personal data and cryptocurrency.

Threat actors are currently using AI to use elaborate social engineering tricks to target Apple users, but the company doesn't seem to do much about it. Meanwhile, Cybersecurity Report has identified a new Mac malware called FrigidStealer. This is spreading to fake browser updates and compromised websites.

Be protected and informed! Get security alerts and expert technical tips – Sign up for The CyberGuy Report in Cart today.

Mac laptop images (Kurt “Cyberguy” Knutsson)

What you need to know

A new malware stock called FrigidStealer is targeting MACOS users as part of a broader campaign that includes fake update scams, cybersecurity company proof points It has been reported. FrigidStealer spreads through compromised websites that display fraudulent browser update prompts. When a user clicks on these prompts, they unconsciously download the malicious DMG file. When executed, the malware asks for the user's system password and gains high privileges before stealing sensitive information such as browser cookies, password-related files, cryptocurrency data, and Apple Notes.

Proofpoint has identified two new threat actors, TA2726, behind the operation. TA2726 is a TA2726 that acts as a traffic distribution service provider and a TA2727 that provides FrigidStealer to MAC users. This campaign deploys malware on Windows and Android devices, informing you of multi-platform attack strategies. The cybersecurity company has confidently evaluated that TA2726 will also distribute traffic from other malware campaigns. Some operations previously attributed to TA569 have now been reclassified based on TA2726 and TA2727.

TA569 – also known as Mustard Tempest, Gold Prelude, and Purple Val Hand – is linked to the evil coop of the Cybercrime Syndicate and was first identified in 2022.

Proofpoint was also rated with moderate confidence that TA2727 can purchase traffic and spread malware through online forums.

“These are traffic sellers and malware distributors, and are observed across multiple web-based attack chains, including compromised website campaigns,” the report states, “including reports using lures themed about fake updates.”

New malware exploits fake updates to steal data

Fake Update Lure Provides FrigidStealer via Safari, left, and Chrome (Proofpoint) (Kurt “Cyberguy” Knutsson)

Best virus protection for MAC, PC, iPhone and Androids – CyberGaipic

Infostealers are on the rise

Threat Intelligence Platform Kera It has been reported Hackers using Lumma, along with StealC, Redline and other infosealers, infected 4.3 million machines in 2024, impairing the qualifications of an estimated 330 million people. Security researchers also observed 3.9 billion credentials circulating into a list that appears to be generated from Infostealer logs.

Infostealer Malware is expected to remain a lasting threat in 2025. Malware-as-aaaaaaaaaaaaaaaaaaas-as-as-asa-as-as-asa-as-as-a-la-ers are more sophisticated, and cybercriminals may continue to rely on them as the primary tools for stealing credentials and invasion systems.

New malware exploits fake updates to steal data

Man working on a Mac laptop (Kurt “Cyberguy” Knutsson)

From Tiktok to Trouble: How to weaponize your online data against you

Four Ways to Stay Safe from Infostealer Malware

Because Infostealer malware is sophisticated, it is more important than ever to take proactive steps to protect your data. Below are four important ways to protect yourself from threats such as FrigidStealer, Lumma, and other qualification-theft malware:

1) Beware of fake software updates: One of the most common infection methods is to use the deceptive browser update prompt. Do not download updates from pop-ups or random websites. Instead, always update your software directly from official sources such as the App Store or the official application website. If you are in doubt, check me out A detailed guide on how to update your device and software.

2) Enable 2-factor authentication (2FA): Even if your credentials are stolen 2FA Add an additional layer of security by requiring a secondary verification method, such as one-time code sent to your phone. Use 2FA for all your important accounts, including email, banking, and cloud services.

3) Using the Password Manager: Many Infostealers target saved passwords in web browsers. Instead of relying on a browser to store your credentials, it's a dedicated one. Password Manager. Get my details Find the best expert reviewed password managers of 2025 here.

4) Be careful of downloads and links. Use a powerful antivirus: Infostealer malware is often spread through malicious downloads, phishing emails, and fake websites. Do not download software or files from untrusted sources or always double-check the link before clicking it. It is recommended that attackers stick to official websites and app stores for download, as they disguise the malware as legitimate software, game cheats, or crack applications.

The best way to protect yourself from malicious links to install malware is to install powerful antivirus software on all your devices, as it may access your personal information. This protection can also warn you that it will phish email and ransomware scams and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.

This is what a ruthless hacker stole from 110 million AT&T customers.

Important points of cart

As digital landscapes evolve, so too will the troublesome threats we face. FrigidStealer is just the latest reminder that no platform is immune to the increasing sophistication of cybercriminals. The rise of AI-driven attacks and social engineering fraud poses a challenging path ahead, as infosealers such as Lumma, Stealc and Redline have already compromised millions of devices and billions of credentials in 2024.

Do you think companies like Apple should do more to combat these evolving threats? Write us and let us know cyberguy.com/contact.

For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.

Ask us a question in our cart or let us know what you want us to cover.

Follow your cart on his social channels:

Answers to the most accused Cyber ​​Guy questions:

New from Cart:

Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News