Loading cryptocurrency prices...

ModStealer Malware Evades Detection, Targets Crypto Wallets

Malware spreads through fake recruiter ads aimed at developers.

  • New Malware called ModStealer targets crypto wallets on Windows, macOS, and Linux.
  • ModStealer evades common antivirus detection and steals sensitive data.
  • It disguises itself as a helper program and sends stolen details to remote servers.
  • Experts warn it poses a serious risk to crypto users and digital asset platforms.

A newly identified malware called ModStealer is actively targeting cryptocurrency users by stealing data from browser-based wallet extensions on computers running Windows, Linux, and macOS. The malware was discovered in early September after operating undetected for nearly a month and is distributed using fake job recruiter ads designed to reach developers.

- Advertisement -

According to security company Mosyle, the malware is spread through misleading advertisements that specifically target developers likely to have Node.js environments already set up. These ads contain obfuscated code, helping ModStealer avoid being flagged by most major antivirus tools. Once downloaded, the malware searches the infected system for browser wallet extensions, login credentials, and digital certificates.

Shān Zhang, the chief information security officer at blockchain security group Slowmist, stated to Decrypt that ModStealer works across multiple operating systems and “evades detection by mainstream antivirus solutions and poses significant risks to the broader digital asset ecosystem.” Once running, ModStealer sends all stolen information to command and control (C2) servers operated by attackers. C2 servers are systems cybercriminals use to coordinate and manage malware activities remotely.

On macOS devices, ModStealer persists by setting itself up as a background helper application that launches on startup. Signs of infection include the presence of a hidden file named “.sysupdater.dat” and unusual connections to suspicious servers. Zhang explained that its use of common persistence methods combined with strong code obfuscation help it remain undetected by signature-based security tools.

This discovery comes just after Ledger CTO Charles Guillemet warned of another breach involving an NPM developer account compromise that could have replaced crypto wallet addresses in user transactions. Although that attack was stopped early, Guillemet said packages had been set up to target Ethereum, Solana, and other blockchains.

- Advertisement -

Zhang cautioned that “private keys, seed phrases, and exchange API keys may be compromised, resulting in direct asset loss” for users. For the industry, he added, “mass theft of browser extension wallet data could trigger large-scale on-chain exploits.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...

Peraire-Bueno Bros Face Retrial in $25M Ethereum Fraud Case

Anton and James Peraire-Bueno face a potential retrial for alleged fraud and money laundering...

AMD Shares Surge 8% on Strong AI Data Center Growth Outlook

Advanced Micro Devices (AMD) expects a 60% increase in data center revenue over the...
- Advertisement -

Must Read

Sushiswap vs Uniswap, What are the differences between these dex?

It's no secret that the world of decentralized exchanges has exploded in recent years. Many of you are probably wondering what the difference is...