Windows has always been a favorite target for hackers, but it seems they understand how to actively target Macs. We saw an astonishing increase in malware affecting Mac computers, stealing personal data and cryptocurrency.
Threat actors are currently using AI to use elaborate social engineering tricks to target Apple users, but the company doesn’t seem to do much about it. Meanwhile, Cybersecurity Report has identified a new Mac malware called FrigidStealer. This is spreading to fake browser updates and compromised websites.
Be protected and informed! Get security alerts and expert technical tips – Sign up for The CyberGuy Report in your cart now.
Mac laptop images (Kurt “Cyberguy” Knutsson)
What you need to know
A new malware stock called FrigidStealer is targeting MACOS users as part of a broader campaign that includes fake update scams, cybersecurity company ProofPoint reports. FrigidStealer spreads through compromised websites that display fraudulent browser update prompts. When a user clicks on these prompts, they unconsciously download the malicious DMG file. When executed, the malware asks for the user’s system password and gains high privileges before stealing sensitive information such as browser cookies, password-related files, cryptocurrency data, and Apple Notes.
Proofpoint has identified two new threat actors, TA2726, behind the operation. TA2726 is a TA2726 that acts as a traffic distribution service provider and a TA2727 that provides FrigidStealer to MAC users. This campaign deploys malware on Windows and Android devices, informing you of multi-platform attack strategies. The cybersecurity company has confidently evaluated that TA2726 will also distribute traffic from other malware campaigns. Some operations previously attributed to TA569 are now reclassified based on TA2726 and TA2727.
TA569 – also known as Mustard Tempest, Gold Prelude, and Purple Val Hand – is linked to the evil coop of the Cybercrime Syndicate and was first identified in 2022.
Proofpoint was also rated with moderate confidence that TA2727 can purchase traffic and spread malware through online forums.
“These are traffic sellers and malware distributors, and are observed across multiple web-based attack chains, including compromised website campaigns,” the report states, “including reports using lures themed about fake updates.”


Fake Update Lure Provides FrigidStealer via Safari, left, and Chrome (Proofpoint) (Kurt “Cyberguy” Knutsson)
Best virus protection for MAC, PC, iPhone and Androids – CyberGaipic
Infostealers are on the rise
Threat intelligence platform Kela, along with StealC, Redline and other infosealers, reported that in 2024 it infected 4.3 million machines, impairing the qualifications of an estimated 330 million people. Security researchers also observed 3.9 billion credentials circulating into a list that appears to be generated from Infostealer logs.
Infostealer Malware is expected to remain a lasting threat in 2025. Malware-as-aaaaaaaaaaaaaaaaas-as-as-asa-as-as-asa-as-as-asa-ers are more sophisticated, and cybercriminals may continue to rely on them as the primary tools for stealing credentials and invasion systems.


Man working on a Mac laptop (Kurt “Cyberguy” Knutsson)
From Tiktok to Trouble: How to weaponize your online data against you
Four Ways to Stay Safe from Infostealer Malware
Because Infostealer malware is sophisticated, it is more important than ever to take proactive steps to protect your data. Below are four important ways to protect yourself from threats such as FrigidStealer, Lumma, and other qualification-theft malware:
1) Beware of fake software updates: One of the most common infection methods is to use the incorrect browser update prompt. Do not download updates from pop-ups or random websites. Instead, always update your software directly from official sources such as the App Store or the official application website. If you are in doubt, check out our detailed guide on how to update your device and software.
2) Enabling 2-factor authentication (2FA): Even if your credentials are stolen, 2FA adds an additional layer of security by requiring a secondary verification method, such as a one-time code sent to your mobile phone. Use 2FA for all your important accounts, including email, banking, and cloud services.
3) Using Password Manager: Many Infostealers Targets Target saved passwords in a web browser. Instead of relying on your browser to store your credentials, use a dedicated password manager. For more information about my best expert reviewed password managers of 2025, click here.
4) Be careful of downloads and links. Use a powerful anti-virus. Infostealer malware spreads through malicious downloads, phishing emails and fake websites. Do not download software or files from untrusted sources or always double-check the link before clicking it. It is recommended that attackers stick to official websites and app stores for download, as they disguise the malware as legitimate software, game cheats, or crack applications.
The best way to protect yourself from malicious links to install malware is to install powerful antivirus software on all your devices, as it may access your personal information. This protection can also warn you that it will phish email and ransomware scams and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
This is what a ruthless hacker stole from 110 million AT&T customers.
Important points of cart
As digital landscapes evolve, so too will the troublesome threats we face. FrigidStealer is the latest reminder that no platform is immune to the increasing sophistication of cybercriminals. The rise of AI-driven attacks and social engineering fraud poses a challenging path ahead, as infosealers such as Lumma, Stealc and Redline have already compromised millions of devices and billions of credentials in 2024.
Do you think companies like Apple should do more to combat these evolving threats? Please let us know by writing to cyberguy.com/contact.
For more information about my tech tips and security alerts, head to cyberguy.com/newsletter and subscribe to our free Cyberguy Report newsletter.
Please ask your cart or tell us what stories you would like us to cover.
Follow your cart on his social channels:
Answers to the most accused Cyber ​​Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.