PANews reported on September 12 that according to Cointelegrap, according to research by security company Mosyle, the newly discovered malware ModStealer is targeting cryptocurrency users on macOS, Windows, and Linux systems to steal wallet private keys and login credentials. The malware was not detected by mainstream antivirus engines for nearly a month after being uploaded to the VirusTotal platform. ModStealer is spread through fake recruitment advertisements, especially targeting Web3 developers. After the user installs the malware package, the program will be embedded in the system background and run, stealing clipboard data, taking screenshots, and executing remote commands. Its code specifically targets Safari and Chromium browser wallet extensions. ModStealer persists on macOS by registering a background agent. The server is located in Finland but may use German infrastructure to mask the operator's source. The technical director of blockchain security company Hacken recommends developers verify the authenticity of the hiring company and domain name, share testing tasks through public code repositories, and open files in a temporary virtual machine without a wallet or private keys. He also emphasizes the need to strictly separate development environments from wallet storage environments, use hardware wallets, and verify transaction addresses on the device's display.PANews reported on September 12 that according to Cointelegrap, according to research by security company Mosyle, the newly discovered malware ModStealer is targeting cryptocurrency users on macOS, Windows, and Linux systems to steal wallet private keys and login credentials. The malware was not detected by mainstream antivirus engines for nearly a month after being uploaded to the VirusTotal platform. ModStealer is spread through fake recruitment advertisements, especially targeting Web3 developers. After the user installs the malware package, the program will be embedded in the system background and run, stealing clipboard data, taking screenshots, and executing remote commands. Its code specifically targets Safari and Chromium browser wallet extensions. ModStealer persists on macOS by registering a background agent. The server is located in Finland but may use German infrastructure to mask the operator's source. The technical director of blockchain security company Hacken recommends developers verify the authenticity of the hiring company and domain name, share testing tasks through public code repositories, and open files in a temporary virtual machine without a wallet or private keys. He also emphasizes the need to strictly separate development environments from wallet storage environments, use hardware wallets, and verify transaction addresses on the device's display.

New ModStealer malware targets crypto wallets across operating systems

2025/09/12 19:19
1 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo crypto.news@mexc.com.

PANews reported on September 12 that according to Cointelegrap, according to research by security company Mosyle, the newly discovered malware ModStealer is targeting cryptocurrency users on macOS, Windows, and Linux systems to steal wallet private keys and login credentials. The malware was not detected by mainstream antivirus engines for nearly a month after being uploaded to the VirusTotal platform. ModStealer is spread through fake recruitment advertisements, especially targeting Web3 developers. After the user installs the malware package, the program will be embedded in the system background and run, stealing clipboard data, taking screenshots, and executing remote commands. Its code specifically targets Safari and Chromium browser wallet extensions. ModStealer persists on macOS by registering a background agent. The server is located in Finland but may use German infrastructure to mask the operator's source.

The technical director of blockchain security company Hacken recommends developers verify the authenticity of the hiring company and domain name, share testing tasks through public code repositories, and open files in a temporary virtual machine without a wallet or private keys. He also emphasizes the need to strictly separate development environments from wallet storage environments, use hardware wallets, and verify transaction addresses on the device's display.

Opportunità di mercato
Logo PUBLIC
Valore PUBLIC (PUBLIC)
$0.01566
$0.01566$0.01566
-0.31%
USD
Grafico dei prezzi in tempo reale di PUBLIC (PUBLIC)
Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta crypto.news@mexc.com per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!