mac os
Cyber Security

Researchers Expose DigitStealer C2 Infrastructure Targeting macOS Users

DigitStealer’s expanding command-and-control (C2) footprint is exposing more of its backend than its operators likely intended, giving defenders fresh opportunities to track and block new infrastructure linked to the macOS‑targeting infostealer.

Unlike many popular stealers, it does not expose a web panel for affiliates, strongly suggesting a closed-operation rather than a broad malware‑as‑a‑service (MaaS) offering.

Subsequent reports from vendors such as Moonlock and Microsoft, along with frequent IOC sharing on X, show DigitStealer being delivered via trojanized macOS applications like “DynamicLake,” often packaged as deceptive disk images that impersonate legitimate productivity tools.

First documented in mid‑November 2025 by Jamf Threat Labs ,DigitStealer is a macOS infostealer that focuses on Apple Silicon systems, especially M2‑class devices, and targets 18 cryptocurrency wallets, browser data, and macOS keychain entries.

After installation, the malware runs a multi‑stage chain of payloads, establishes persistence via a Launch Agent, and polls its C2 every 10 seconds for new AppleScript or JavaScript tasks, effectively acting as a long‑lived backdoor on compromised Macs.

C2 Behavior Exposes Infrastructure Fingerprint

At the network layer, DigitStealer communicates with four key endpoints on its C2 servers: /api/credentials for stolen credentials, /api/grabber for file uploads, /api/poll for backdoor tasking, and /api/log for additional telemetry and logging.

Before issuing commands, the C2 server paths enforces a cryptographic challenge‑response step in which the server provides a unique challenge string and a complexity level, requiring the malware to compute a value that, when hashed with the challenge, matches a specific pattern to obtain a valid session token.

The malware also sends the system’s hardware UUID hashed with MD5, giving defenders a stable artifact to hunt for in outbound traffic and C2 logs.

Example request to a DigitStealer C2 containing the cryptographic challenge (Source : Jamf Threat Labs).
Example request to a DigitStealer C2 containing the cryptographic challenge (Source : Jamf Threat Labs).

Researchers have demonstrated that simply issuing HTTP or HTTPS requests to these API paths and inspecting JSON responses for fields like “challenge” and “complexity” is an effective way to verify suspected DigitStealer infrastructure, especially when combined with WHOIS checks for recurring registrar and nameserver patterns.

New analysis of DigitStealer samples and open source reports has uncovered additional C2 domains such as diamondpickaxeforge[.]com, ebemvsextiho[.]com, bottleneckid[.]com, booksmagazinetx[.]com, goldenticketsshop[.]com, and fixyourallergywithus[.]com, many of which were first highlighted by independent X researchers tracking the campaign.

These domains share a consistent infrastructure profile: they almost exclusively use the .com TLD, terminate HTTPS on nginx over port 443, and frequently sit behind Let’s Encrypt‑issued TLS certificates.

IP‑level views via threat‑hunting platforms show these domains clustering on a single hosting provider, the Ab Stract Ltd network in Sweden, with multiple C2s resolving to adjacent addresses inside the same ASN.

Example IP Summary information for a DigitStealer C2 (Source : Jamf Threat Labs).
 Example IP Summary information for a DigitStealer C2 (Source : Jamf Threat Labs).

Across this cluster, analysts observed repeating SSH banners such as OpenSSH 9.6p1 and later variants on Ubuntu, further tightening the linkage between servers and suggesting a templated deployment process.

Registration Patterns to Centralized Operation

Domain registration records provide another layer of commonality: most DigitStealer‑linked domains are registered via Tucows, with a minority outlier or two tied to other registrars that do not fit the prevailing pattern.

Python results checking against the known DigitStealer endpoints (Source : Jamf Threat Labs).
 Python results checking against the known DigitStealer endpoints (Source : Jamf Threat Labs).

Regardless of TLD choice, the domains consistently rely on Njalla nameservers, a legitimate provider that has nonetheless frequently appeared in infrastructure supporting ransomware and other malware campaigns.

Timeline analysis indicates that the operators tend to register domains in tight batches aligned to specific campaigns, with one wave observed from mid‑2025 into late 2025 and another beginning in early 2026, consistent with coordinated infrastructure rollouts.

Taken together single ASN, repeated web and SSH stacks, Tucows registrations, Njalla nameservers, and predictable API behavior the evidence favors DigitStealer being run by a single actor or a small, tightly coordinated team rather than a sprawling affiliate ecosystem.

By combining simple queries over IP metadata (ASN, TLS, server headers, SSH versions) with active checks to the known DigitStealer API paths, defenders can build practical detection logic to uncover both reported and previously unknown C2 servers following this fingerprint.

While some domains identified in recent investigations are already offline or dormant, many still resolve or will likely be repurposed, making proactive blocking and monitoring of these patterns an effective way to “burn” infrastructure before it can be fully weaponized against macOS users.

Indicators of Compromise

IP Address Domain ASN
80.78.30[.]90 beetongame[.]com ab stract ltd
80.78.25[.]205 binance.comtr-katilim[.]com
yourwrongwayz[.]com
chiebi[.]com
ab stract ltd
80.78.30[.]191 tribusadao[.]com
theinvestcofund[.]com
cekrovnyshim[.]com
ab stract ltd
80.78.30[.]146 ebemvsextiho[.]com
th6969[.]top
ab stract ltd
80.78.22[.]140 flowerskitty[.]com ab stract ltd
80.78.22[.]131 ironswordzombiekiller[.]com
siriustimes[.]info
siriustimes[.]rocks
bchat[.]cc
red-letter[.]org
ab stract ltd,
bchat[.]cc – Immaterialism
80.78.31[.]72 rompompomsigma[.]com ab stract ltd
80.78.27[.]104 diamondpickaxeforge[.]com ab stract ltd

3 Comments

  • admin April 7, 2022

    Borem Ipsum is simply dummy text of the printing and typesetting indusem Ipsum has is simply dumhe printing.

    • admin April 15, 2022

      Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versionsome to WordPress. This is your first post. Edit or delete it, then start writing!

  • admin April 7, 2022

    Borem Ipsum is simply dummy text of the printing and typesetting indusem Ipsum has is simply dumhe printing. It was popularised in the of Letraset sheets.

Leave a Reply

Your email address will not be published. Required fields are marked *