
While Windows has historically been a prime target for hackers, Mac users are now increasingly at risk. Recent reports highlight a concerning surge in **malware targeting Mac computers**, leading to personal data breaches and cryptocurrency theft.
Cybercriminals are leveraging **AI** and sophisticated **social engineering tactics** to exploit Apple users, and the response from the tech community has been lacking. A recent cybersecurity report has identified a new macOS malware, **Frigidtealer**, which spreads through **fake browser updates** and compromised websites.
Stay protected and informed! Get security alerts and expert technical tips – Sign up for the Kurt’s Tech Word News report.
Picture of Mac Notebook (Kurt “Tech Word News” Knutsson)
What You Need to Know
The new malware, **Frigidtealer**, targets macOS users as part of a broader campaign involving **fake browser updates**, according to cybersecurity firm Proofpoint. Frigidtealer spreads through compromised websites displaying deceptive update prompts. When users click on these prompts, they unknowingly download a malicious DMG file. Once installed, the malware requests the user’s password to gain elevated permissions, enabling it to steal sensitive information such as browser cookies, password files, cryptocurrency data, and Apple Notes.
Proofpoint has identified two new threat actors involved in these operations: **TA2726**, which acts as a distribution provider, and **TA2727**, which delivers Frigidtealer to Mac users. The campaign also targets Windows and Android devices, indicating a multi-platform attack strategy. Proofpoint assesses with high confidence that TA2726 distributes malware for other campaigns as well. Some operations previously attributed to **TA569** have now been reclassified under TA2726 and TA2727.
TA569, also known as **Tempest**, **Gold Prelude**, and **Purple Vallhund**, is linked to the cybercrime syndicate **Evilcorp** and was first identified in 2022.
Proofpoint also suggests with moderate certainty that TA2727 may purchase operations through online forums to spread malware, either for its own purposes or on behalf of clients.
“These actors serve as retailers and distributors of malware and have been observed in multiple attack chains, including those using compromised websites and fake update prompts,” the report states.
False update prompts delivering Frigidtealer via Safari (left) and Chrome (right) (Proofpoint) (Kurt “Tech Word News” Knutsson)
Best Antivirus for Mac, PC, iPhone, and Android – Tech Word News Tips
Infostealers on the Rise
Threat intelligence platforms report that hackers using **Lumma**, **Redline**, and other infostealers have infected **4.3 million devices** in 2024, compromising an estimated **330 million login credentials**. Security researchers have also observed **3.9 billion credentials** circulating on dark web lists, likely harvested through infostealer campaigns.
Infostealer malware is expected to remain a persistent threat in 2025. As these malicious tools become more sophisticated, cybercriminals will likely continue relying on them to steal login credentials and infiltrate systems.
A man working on his Mac notebook (Kurt “Tech Word News” Knutsson)
From TikTok to Trouble: How Your Online Data Can Be Weaponized Against You
4 Ways to Stay Safe from Infostealer Malware
As infostealer malware evolves, it’s crucial to take proactive steps to protect your data. Here are four key strategies to safeguard yourself from threats like Frigidtealer, Lumma, and other credential-stealing malware:
1) Beware of Fake Software Updates: Infostealers often spread through fake browser updates. Never download updates from pop-ups or suspicious websites. Always update your software through official sources like the App Store or the software provider’s official website. Check out my detailed guide on keeping your devices and software updated for more tips.
2) Enable Two-Factor Authentication (2FA): Even if your credentials are stolen, 2FA adds an extra layer of security by requiring a secondary verification method, such as a one-time code sent to your phone. Use 2FA for all critical accounts, including email, banking, and cloud services.
3) Use a Password Manager: Many infostealers target browser-stored passwords. Instead, use a dedicated password manager to securely store your login information. Learn more about the best password managers of 2025 here.
4) Be Cautious with Downloads and Links. Use a Strong Antivirus: Infostealers often spread through malicious downloads, phishing emails, and fake websites. Avoid downloading software or files from untrusted sources, and always double-check links before clicking. Malware is frequently disguised as legitimate software, game cheats, or cracked applications, so stick to official websites and app stores for downloads.
The best way to protect yourself from malicious links and malware is to install **strong antivirus software** on all your devices. This software can alert you to phishing emails, ransomware, and other threats, keeping your personal information and digital assets safe. Get my top picks for the best antivirus protection in 2025 for Windows, Mac, Android, and iOS devices.
Here’s What Ruthless Hackers Stole from 110 Million AT&T Customers
Kurt’s Key Takeaway
As the digital landscape evolves, so do the threats we face. Frigidtealer is a stark reminder that no platform, including macOS, is immune to the growing sophistication of cyberattacks. With infostealers like Lumma, Coldc, and Redline compromising millions of devices and billions of credentials, and the rise of AI-powered attacks and social engineering scams, the road ahead is challenging.
Do you think companies like Apple should do more to combat these evolving threats? Let us know by writing to us at Tech Word News.com/contact.
For more tech tips and security alerts, subscribe to my Tech Word News Report newsletter at Tech Word News.com/newsletter.
Ask Kurt a question or suggest stories you’d like us to cover.
Follow Kurt on his social channels for the latest updates and answers to your tech questions.
Copyright 2025 Tech Word News.com. All rights reserved.