Monday, September 15, 2025
Popular
HomeDeFi & NFTUntreatable crypto-independence modsteal malware goals aims to make envelope on Mac and...

Untreatable crypto-independence modsteal malware goals aims to make envelope on Mac and Windows

-

Newly Discovered Modstealer Malware Poses Significant Threat to Crypto Users

Cybersecurity researchers have identified a new Infostal malware, known as Modstealer, which targets cryptocurrency wallets and extracts private keys and other sensitive information on Windows, Linux, and MacOS, all while remaining undetected by major antivirus engines. This malicious software has been operational for weeks, with its presence first noted on Virustotal almost a month ago, yet it has managed to evade detection by all large antivirus engines.

The Modstealer malware was discovered by Moosyle, a safety platform specializing in Apple device management. According to Moosyle’s report, the malware has been designed to infiltrate systems with Windows and Linux-powered systems, in addition to MacOS. What makes this malware particularly concerning is its ability to remain invisible to antivirus engines, allowing it to operate unchecked.

Modstealer’s Mode of Operation and Targets

Modstealer aims at browser-based crypto wallets, with the malware being spread through fake recruitment ads. The malicious software is encoded in a node.js environment with a heavily veiled JavaScript file, making it difficult to recognize. This encoding allows the malware to target developers, who often have increased authorizations during software tests and provision, providing an attractive entry point for attackers. Developers, as part of their workflow, process sensitive login information, access keys, and crypto wallets, making them high-value targets.

The primary goal of Modstealer, once it has been delivered to a victim’s system, is data exfiltration. The malware is capable of stealing crypto private keys, with the malicious code addressing at least 56 different browser wallet extensions, including Safari. Additionally, Modstealer can extract data from clipboard boards, record a victim’s screen, and execute malicious code on the target system remotely, giving bad actors almost complete control over infected devices.

Modstealer’s Stealth and Operational Capabilities

What makes this discovery particularly alarming is the stealth with which Modstealer operates. The malware can embed itself into the system’s launchd plist tool on MacOS, disguising itself as a legitimate service and allowing it to run automatically every time the device starts. The extracted data from victim systems is forwarded to a remote server based in Finland, which is connected to infrastructure in Germany, likely as a means to obscure the true location of the operators.

Moosyle has warned that signature-based protective measures alone are not sufficient to counter this threat. Continuous surveillance, behavioral immune systems, and awareness of emerging threats are crucial in staying ahead of adversaries. As the crypto adoption continues to rise globally, threat actors are increasingly focusing on developing complex attack vectors on digital assets, making it essential for users to remain vigilant and proactive in protecting their assets.

New Threats for Mac and Windows Crypto Users

The discovery of Modstealer is not an isolated incident; it is part of a broader trend of threat actors targeting crypto users. At the beginning of this month, researchers from Reversinglabs warned about open-source malware on Ethereum Smart Contracts that could deliver malicious payloads to crypto users. These threats underscore the importance of robust security measures and ongoing vigilance in the crypto community.

For more information on the Modstealer malware and how to protect against such threats, please refer to the original report and cybersecurity guidelines. The crypto community must remain informed and adapt to these evolving threats to safeguard digital assets.

Source: https://crypto.news/undetectable-crypto-stealing-modstealer-malware-targets-wallets-on-mac-and-windows/

crypto news Digital identity is the infrastructure crisis option03

Related articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest posts