New FrigidStealer Infostealer by New Threat Actors infects Multiple Devices via Compromised Websites

Apple store

Executive Summary

Proofpoint has identified two new cybercriminal threat actors, TA2726 and TA2727, responsible for web inject campaigns that distribute malware through compromised websites, according to a recently published report. TA2726 and TA2727 actors operate traffic distribution services (TDS) to redirect users to fake update lures, leading to the installation of malware on Windows, MacOS, and Android devices. A newly discovered MacOS malware, FrigidStealer, was deployed via these campaigns, highlighting the increasing sophistication of threats targeting Apple systems.

Community Impact

The retail and hospitality industries are prime targets for web inject campaigns, as these sectors rely on customer-facing websites and e-commerce platforms that can be compromised and used to spread malware. Attackers can redirect unsuspecting shoppers or employees to malicious fake update pages, leading to the theft of payment information, credentials, and other sensitive data. RH-ISAC Core Member Organizations should ingest the intelligence included in this report, the original Proofpoint report, linked above, and review and ingest the provided Indicators of Compromise, included below.

Technical Analysis

Proofpoint’s research revealed that TA2726 and TA2727 operate complex, multi-step malware delivery chains using web injects. These campaigns utilize traffic distribution services (TDS) to filter and redirect users based on their operating system, location, and browser type, ensuring they receive a tailored malicious payload.

Key malware variants distributed include:

  • Lumma Stealer (Windows) & DeerStealer (Windows): Credential-harvesting malware targeting Windows users.
  • FrigidStealer (MacOS): A new info-stealing malware targeting Mac users, harvesting browser cookies, Apple Notes, and cryptocurrency-related files.
  • Marcher (Android): A banking trojan that tricks users into providing financial login credentials.

The attack chain involves fake update lures that prompt users to download malicious files disguised as legitimate software updates. In the case of MacOS, the DMG file installs FrigidStealer, leveraging Gatekeeper bypass techniques to evade detection. Additionally, Windows variants utilize DLL side-loading to execute payloads discreetly.

Indicators of Compromise

Proofpoint has provided the following Indicators of Compromise below:

IOCs

Description

askforupdate[.]org

FrigidStealer C2 

rednosehorse[.]com

TA2726 TDS 

blackshelter[.]org

TA2726 TDS 

deski[.]fastcloudcdn[.]com

Serving TA2727 lure 

slowlysmiling[.]fastcloudcdn[.]com

Serving TA2727 lure 

e1202c017c76e06bfa201ad6eb824409c2529e887bdaf128fc364bdbc9e1e214

FrigidStealer (Safari Themed) 

274efb6bb2f95deb7c7f8192919bf690d69c3f3a441c81fe2a24284d5f274973

Frigid Stealer (Chrome Themed) 

ca172f8d36326fc0b6adef9ea98784fd216c319754c5fc47aa91fce336c7d79a

Marcher (Android) 

fbccc8952710a8a50655f4fe3a880c8373411b7ec40e54aabd7eaff3f1d0137b

DOILoader into Lumma Stealer 

d34c95c0563c8a944a03ee1448f0084dfb94661c24e51c131541922ebd1a2c75

DOILoader into DeerStealer 

More Recent Blog Posts