DigitStealer is a multi-stage infection chain starting with an unsigned DMG - DynamicLake.dmg - being distributed from a spoofed domain masquerading as a legitimate macOS utility. Once mounted, the user is prompted to drag a script onto Terminal, invoking a curl | bash execution to download the first-stage payload. Prior to doing so, the malware conducts strict anti-analysis and hardware checks to ensure execution only on genuine Apple Silicon M2 or newer hardware, allowing it to bypass Virtual Machines, Intel Macs, and even earlier ARM models. The first stage uses AppleScript to collect preliminary system data, solicit the user's macOS password, and then let it elevate access to sensitive files like Documents, Desktop, Notes, and multiple key configuration directories. This stage also tampers with TCC settings, which, in the future, will enable other payloads to access protected resources without any prompts to the user. The second stage is written in JavaScript for Automation and extends the scope of data collection to browsers, keychain entries, Telegram data, and several cryptocurrency wallet clients such as Electrum, Exodus, and Coinomi. A third stage is specifically for compromising Ledger Live. The malware downloads and rebuilds a modified app.asar file, overwriting legitimate application components to reroute Ledger Live's internal API traffic to an attacker-controlled endpoint. This modification allows the theft of wallet configurations, transaction metadata, and possibly recovery phrases. Persistence is achieved via a Launch Agent that retrieves ongoing instructions from a DNS-based command-and-control server, using TXT records to hide communication and evade traditional security monitoring.
Android users are being targeted in a large-scale malware operation designed to silently enroll victims into premium mobile billing services without consent. The campaign abuses ca...
U.S. and Canadian law enforcement agencies have detained an alleged operator connected to the KimWolf botnet, a cybercrime platform known for conducting large-scale DDoS attacks us...
A newly identified Phishing-as-a-Service (PhaaS) platform named Kali365 is actively targeting Microsoft 365 users by abusing OAuth device authentication flows to bypass multi-facto...