The post ModStealer Malware Targets Crypto Wallets Across Platforms appeared on BitcoinEthereumNews.com. A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials. Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported. Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers.  The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin. Security firm warns of fake job ads The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders.  Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands.  Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments.  “Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.” Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between… The post ModStealer Malware Targets Crypto Wallets Across Platforms appeared on BitcoinEthereumNews.com. A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials. Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported. Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers.  The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin. Security firm warns of fake job ads The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders.  Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands.  Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments.  “Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.” Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between…

ModStealer Malware Targets Crypto Wallets Across Platforms

2025/09/13 06:59
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials.

Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported.

Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers. 

The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin.

Security firm warns of fake job ads

The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders. 

Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands. 

Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments. 

“Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.”

Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between their development environments and wallet storage. 

“A clear separation between the development environment ‘dev box’ and wallet environment ‘wallet box’ is essential,” he told Cointelegraph.

Related: Failed NPM exploit highlights looming threat to crypto security: Exec

Hacken security lead shares practical steps for users

Ajayi also stressed the importance of basic wallet hygiene and endpoint hardening to defend against threats like Modstealer.

“Use hardware wallets and always confirm transaction addresses on the device display, verifying at least the first and last six characters before approving,” he told Cointelegraph.

Ajayi advised users to maintain a dedicated, locked-down browser profile or a separate device exclusively for wallet activity, interacting with only the trusted wallet extensions.

For account protection, he recommended offline storage of seed phrases, multifactor authentication and the use of FIDO2 passkeys when possible. 

Magazine: Thailand’s ‘Big Secret’ crypto hack, Chinese developer’s RWA tokens: Asia Express

Source: https://cointelegraph.com/news/modstealer-malware-crypto-wallets-fake-job-ads?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

시장 기회
플러리싱 에이아이 로고
플러리싱 에이아이 가격(SLEEPLESSAI)
$0.01925
$0.01925$0.01925
-2.08%
USD
플러리싱 에이아이 (SLEEPLESSAI) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!