The post ModStealer Malware Targets Crypto Wallets Across Platforms appeared on BitcoinEthereumNews.com. A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials. Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported. Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers.  The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin. Security firm warns of fake job ads The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders.  Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands.  Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments.  “Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.” Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between… The post ModStealer Malware Targets Crypto Wallets Across Platforms appeared on BitcoinEthereumNews.com. A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials. Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported. Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers.  The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin. Security firm warns of fake job ads The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders.  Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands.  Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments.  “Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.” Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between…

ModStealer Malware Targets Crypto Wallets Across Platforms

A newly-discovered malware called ModStealer is targeting crypto users across macOS, Windows and Linux systems, posing risks to wallets and access credentials.

Apple-focused security firm Mosyle uncovered the malware, saying it remained completely undetected by major antivirus engines for almost a month after being uploaded to VirusTotal, an online platform that analyzes files to detect malicious content, 9to5mac reported.

Mosyle said ModStealer is designed to extract data, with pre-loaded code that steals private keys, certificates, credential files and browser-based wallet extensions. The security researchers found targeting logic for different wallets, including extensions on Safari and Chromium-based browsers. 

The security firm said the malware persists on macOS by abusing the system to register as a background agent. The team said the server is hosted in Finland but believes the infrastructure is routed through Germany to mask the operators’ origin.

Security firm warns of fake job ads

The malware is reportedly being distributed through fake job recruitment ads, a tactic that has been increasingly used to target Web3 developers and builders. 

Once users install the malicious package, ModStealer embeds itself into the system and operates in the background. It captures data from the clipboard, takes screenshots and executes remote commands. 

Stephen Ajayi, DApp and AI audit technical lead at blockchain security firm Hacken, told Cointelegraph that malicious recruitment campaigns using fraudulent “test tasks” as a malware delivery mechanism are becoming increasingly common. He warned developers to take extra precautions when asked to download files or complete assessments. 

“Developers should validate the legitimacy of recruiters and associated domains,” Ajayi told Cointelegraph. “Request that assignments be shared via public repositories, and open any task exclusively in a disposable virtual machine with no wallets, SSH keys or password managers.”

Emphasizing the importance of compartmentalizing sensitive assets, Ajayi advised teams to maintain a strict separation between their development environments and wallet storage. 

“A clear separation between the development environment ‘dev box’ and wallet environment ‘wallet box’ is essential,” he told Cointelegraph.

Related: Failed NPM exploit highlights looming threat to crypto security: Exec

Hacken security lead shares practical steps for users

Ajayi also stressed the importance of basic wallet hygiene and endpoint hardening to defend against threats like Modstealer.

“Use hardware wallets and always confirm transaction addresses on the device display, verifying at least the first and last six characters before approving,” he told Cointelegraph.

Ajayi advised users to maintain a dedicated, locked-down browser profile or a separate device exclusively for wallet activity, interacting with only the trusted wallet extensions.

For account protection, he recommended offline storage of seed phrases, multifactor authentication and the use of FIDO2 passkeys when possible. 

Magazine: Thailand’s ‘Big Secret’ crypto hack, Chinese developer’s RWA tokens: Asia Express

Source: https://cointelegraph.com/news/modstealer-malware-crypto-wallets-fake-job-ads?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
null Logo
null Price(null)
--
----
USD
null (null) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Vitalik Buterin Supports Native Rollup Integration on Ethereum

Vitalik Buterin Supports Native Rollup Integration on Ethereum

The post Vitalik Buterin Supports Native Rollup Integration on Ethereum appeared on BitcoinEthereumNews.com. Key Points: Vitalik Buterin supports ZK Rollups for
Share
BitcoinEthereumNews2026/01/19 15:43
Fan Token Firm Chiliz Acquires 2-Time ‘Dota 2’ Champions, OG Esports

Fan Token Firm Chiliz Acquires 2-Time ‘Dota 2’ Champions, OG Esports

The post Fan Token Firm Chiliz Acquires 2-Time ‘Dota 2’ Champions, OG Esports appeared on BitcoinEthereumNews.com. In brief The Chiliz Group has acquired a controlling stake in OG Esports, a prominent competitive gaming organization. OG Esports unveiled its own fan token on Chiliz’s Socios.com platform back in 2020. It recently hit an all-time high price. Chiliz has teased various future team-related benefits for OG token holders, along with a new Web3-related project. The Chiliz Group, which operates the Socios.com crypto fan token platform, announced Tuesday that it has acquired a 51% controlling stake in OG Esports, the competitive gaming organization founded in 2015 by Dota 2 legends Johan “nOtail” Sundstein and Sébastien “Ceb” Debs. OG made history as the first team to win consecutive titles at The International—the annual, high-profile Dota 2 world championship tournament—in 2018 and 2019, and has since expanded into multiple games including Counter-Strike, Honor of Kings, and Marvel Rivals. The team was also the first esports organization to join the Socios platform with the 2020 debut of its own fan token, which Chiliz said recently became the first esports team token to exceed a $100 million market capitalization. OG was recently priced at $16.88, up nearly 9% on the day following the announcement. The token’s price peaked at a new all-time high of $24.78 last week ahead of The International 2025, where OG did not compete this year. Following the acquisition, Xavier Oswald will assume the CEO role, while the co-founders will turn their attention to “a new strategic project consolidating the team’s competitive foundation [and] driving innovation at the intersection of esports and Web3,” per a press release. No further details were provided regarding that project. “Bringing OG into the Chiliz Group is a major step toward further strengthening fan experiences, one where the community doesn’t just watch from the sidelines but gets to shape the journey,” Chiliz CEO Alex Dreyfus…
Share
BitcoinEthereumNews2025/09/18 09:40
NEAR Price Prediction: Testing Critical $1.88 Resistance with $2.10-$2.35 Targets by February 2026

NEAR Price Prediction: Testing Critical $1.88 Resistance with $2.10-$2.35 Targets by February 2026

The post NEAR Price Prediction: Testing Critical $1.88 Resistance with $2.10-$2.35 Targets by February 2026 appeared on BitcoinEthereumNews.com. Rebeca Moen
Share
BitcoinEthereumNews2026/01/19 15:34