New Malware ‘ModStealer’ Targets Crypto Wallets Across Multiple Platforms

A recently discovered malware, ModStealer, is posing serious threats to cryptocurrency users across macOS, Windows, and Linux. The malware is designed to steal sensitive data, including wallet keys and login credentials, putting both personal and professional digital assets at risk.

Security researchers revealed that ModStealer went undetected by major antivirus engines for nearly a month after it was first uploaded for analysis. The malware contains preloaded code to extract private keys, certificates, credential files, and browser-based wallet extensions. It specifically targets wallets integrated into Safari and Chromium-based browsers.

On macOS, ModStealer ensures persistence by registering itself as a background agent. Investigators traced the server hosting the malware to Finland, though evidence suggests that traffic may be routed through Germany to obscure its origin.

Spread Through Fake Job Ads

One of the main distribution tactics involves fake job recruitment ads, a growing method used to compromise Web3 developers. Victims who install the malicious package unknowingly allow ModStealer to operate in the background. Once embedded, it can capture clipboard data, take screenshots, and even execute remote commands.

Stephen Ajayi, technical lead for DApp and AI audits at blockchain security firm Hacken, warned that fraudulent recruitment campaigns are increasingly using “test tasks” to trick developers into downloading malware. He advised professionals to carefully validate recruiters and domains before engaging. Assignments, he suggested, should only be opened in disposable virtual machines with no access to wallets, SSH keys, or password managers.

Security Best Practices

Ajayi emphasized the importance of separating development environments from wallet storage, recommending a clear division between the “dev box” and the “wallet box.” This compartmentalization helps minimize the risk of cross-contamination.

He also highlighted practical steps for everyday users to secure their assets:

  • Use hardware wallets and confirm transaction addresses directly on the device display. 
  • Create a locked-down browser profile or use a separate device solely for wallet activities. 
  • Store seed phrases offline, enable multifactor authentication, and adopt FIDO2 passkeys where available. 

By maintaining strong wallet hygiene and applying endpoint hardening, users can better protect themselves against emerging threats like ModStealer.

Tage :

Share this post :

Facebook
Twitter
LinkedIn
Email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top