Description

DigitStealer is a multi-stage infection chain starting with an unsigned DMG - DynamicLake.dmg - being distributed from a spoofed domain masquerading as a legitimate macOS utility. Once mounted, the user is prompted to drag a script onto Terminal, invoking a curl | bash execution to download the first-stage payload. Prior to doing so, the malware conducts strict anti-analysis and hardware checks to ensure execution only on genuine Apple Silicon M2 or newer hardware, allowing it to bypass Virtual Machines, Intel Macs, and even earlier ARM models. The first stage uses AppleScript to collect preliminary system data, solicit the user's macOS password, and then let it elevate access to sensitive files like Documents, Desktop, Notes, and multiple key configuration directories. This stage also tampers with TCC settings, which, in the future, will enable other payloads to access protected resources without any prompts to the user. The second stage is written in JavaScript for Automation and extends the scope of data collection to browsers, keychain entries, Telegram data, and several cryptocurrency wallet clients such as Electrum, Exodus, and Coinomi. A third stage is specifically for compromising Ledger Live. The malware downloads and rebuilds a modified app.asar file, overwriting legitimate application components to reroute Ledger Live's internal API traffic to an attacker-controlled endpoint. This modification allows the theft of wallet configurations, transaction metadata, and possibly recovery phrases. Persistence is achieved via a Launch Agent that retrieves ongoing instructions from a DNS-based command-and-control server, using TXT records to hide communication and evade traditional security monitoring.