macOS Users Targeted By DigitStealer Infostealer, Highlighting Security Gaps

macOS Users Targeted By DigitStealer Infostealer, Highlighting Security Gaps
macOS Users Targeted By DigitStealer Infostealer, Highlighting Security Gaps
DigitStealer is an increasingly active macOS infostealer whose predictable backend architecture exposes serious security gaps in its operators’ tradecraft and provides defenders with a clear path to detect related infrastructure early.

While the malware itself uses advanced evasion on Apple M2 hardware, its rigid use of the same hosting provider, domain patterns, and server stack makes much of the supporting command‑and‑control (C2) network surprisingly easy to fingerprint.

macOS Stealer With A Uniform C2 Blueprint

DigitStealer was first detailed by Jamf Threat Labs in November 2025 as a JavaScript for Automation (JXA)‑based macOS infostealer that targets 18 cryptocurrency wallets, browser profiles, and macOS keychain data, with a strong focus on Apple Silicon devices.

It is typically delivered via malicious disk images impersonating legitimate macOS utilities, such as DynamicLake, with distribution via spoofed websites and related lures.

Once executed, the malware runs hardware and environment checks to avoid sandboxes and virtual machines, then proceeds with a staged execution chain that keeps most logic in memory to limit artifacts on disk.

Each stage focuses on a specific task: credential theft, file collection, Ledger Live tampering, and persistence, culminating in a backdoor that polls the C2 for new AppleScript or JavaScript payloads every 10 seconds.

Notably, DigitStealer does not expose a shared web panel for “customers,” which sets it apart from many malware‑as‑a‑service (MaaS) info‑stealers and hints at a more closed, tightly controlled operation.

Example request to a DigitStealer C2 containing the cryptographic challenge (Source: cyberandramen)
Example request to a DigitStealer C2 containing the cryptographic challenge (Source: cyberandramen)

The final backdoor component sends the MD5-hashed hardware UUID of the infected Mac to the C2 at a fixed polling interval, providing operators with a persistent host identifier while keeping raw hardware details opaque on the wire.

Before any tasking is accepted, the C2 server can issue a cryptographic “challenge” with an associated “complexity” level, requiring the malware to compute a number that, when hashed with the challenge, matches a specific pattern; only then does DigitStealer receive a valid session token and task list.

Infrastructure Patterns Suggest A Single Operator Or Small Team

Pivoting on these IPs using threat‑hunting platforms reveals clusters where multiple .com domains are co‑hosted, with nginx HTTPS servers on port 443 and OpenSSH services reporting nearly identical version strings (e.g., OpenSSH 9.6p1/10.x on Ubuntu), reinforcing that the same playbook and build pipeline are being reused.

Example IP Summary information for a DigitStealer C2 (Source: cyberandramen)
Example IP Summary information for a DigitStealer C2 (Source: cyberandramen)

WHOIS and DNS records further narrow the operator profile: most domains are registered via Tucows and consistently configured with Njalla nameservers.

According to Cyber and Ramen, this privacy‑oriented provider has repeatedly appeared in infrastructure linked to ransomware and other malware campaigns.

Domain registration information in DNSAudit.io for a suspected DigitStealer domain (Source: cyberandramen)
Domain registration information in DNSAudit.io for a suspected DigitStealer domain (Source: cyberandramen)

Combined with the single ASN preference, homogeneous server stack, and lack of reseller‑style panels, this strongly indicates that DigitStealer is run by a single actor or a very small team, rather than a large MaaS ecosystem where multiple affiliates pick their own hosting and registration strategies.

IP Address Domain ASN
80.78.30[.]90 beetongame[.]com ab stract ltd
80.78.25[.]205 binance.comtr-katilim[.]com
yourwrongwayz[.]com
chiebi[.]com
ab stract ltd
80.78.30[.]191 tribusadao[.]com
theinvestcofund[.]com
cekrovnyshim[.]com
ab stract ltd
80.78.30[.]146 ebemvsextiho[.]com
th6969[.]top
ab stract ltd

Defenders can exploit these mistakes by building a query or script that checks for C2 endpoint characteristics, looks for JSON responses that expose challenge and complexity fields, and correlates positive hits with WHOIS data showing Tucows registration and Njalla nameservers to flag likely DigitStealer infrastructure at scale.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post macOS Users Targeted By DigitStealer Infostealer, Highlighting Security Gaps appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading