ModStealer Malware Evades Detection, Targets Crypto Wallets

Malware spreads through fake recruiter ads aimed at developers.

  • New Malware called ModStealer targets crypto wallets on Windows, macOS, and Linux.
  • ModStealer evades common antivirus detection and steals sensitive data.
  • It disguises itself as a helper program and sends stolen details to remote servers.
  • Experts warn it poses a serious risk to crypto users and digital asset platforms.

A newly identified malware called ModStealer is actively targeting cryptocurrency users by stealing data from browser-based wallet extensions on computers running Windows, Linux, and macOS. The malware was discovered in early September after operating undetected for nearly a month and is distributed using fake job recruiter ads designed to reach developers.

- Advertisement -

According to security company Mosyle, the malware is spread through misleading advertisements that specifically target developers likely to have Node.js environments already set up. These ads contain obfuscated code, helping ModStealer avoid being flagged by most major antivirus tools. Once downloaded, the malware searches the infected system for browser wallet extensions, login credentials, and digital certificates.

Shān Zhang, the chief information security officer at blockchain security group Slowmist, stated to Decrypt that ModStealer works across multiple operating systems and “evades detection by mainstream antivirus solutions and poses significant risks to the broader digital asset ecosystem.” Once running, ModStealer sends all stolen information to command and control (C2) servers operated by attackers. C2 servers are systems cybercriminals use to coordinate and manage malware activities remotely.

On macOS devices, ModStealer persists by setting itself up as a background helper application that launches on startup. Signs of infection include the presence of a hidden file named “.sysupdater.dat” and unusual connections to suspicious servers. Zhang explained that its use of common persistence methods combined with strong code obfuscation help it remain undetected by signature-based security tools.

This discovery comes just after Ledger CTO Charles Guillemet warned of another breach involving an NPM developer account compromise that could have replaced crypto wallet addresses in user transactions. Although that attack was stopped early, Guillemet said packages had been set up to target Ethereum, Solana, and other blockchains.

- Advertisement -

Zhang cautioned that “private keys, seed phrases, and exchange API keys may be compromised, resulting in direct asset loss” for users. For the industry, he added, “mass theft of browser extension wallet data could trigger large-scale on-chain exploits.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia Networking Sales Soar 143%, Outpace Data Center

NVIDIA's data center networking sales skyrocketed 143% year-over-year, reaching $31.34 billion for fiscal year...

Gate.io gets EU payment license in Malta

Gate obtained a Payment Institution license in Malta under the EU's PSD2 framework.The license...

India’s Gold ETF Inflows Soar 900%, Outpacing Equities

Gold ETF inflows in India have soared to a record ~250 billion rupees (~$3...

Bitcoin Rally Lifts MSTR, CRCL, COIN

Bitcoin's rally toward $69,000 on Wednesday fueled a jump in related equities like Coinbase...

Ethereum Leads Top 10 Crypto Recovery with 8.7% Daily Rally

Ethereum has posted significant gains, rallying 8.7% on the daily charts and now ranking...

Must Read

14 Ways On How to Make Money with Cryptocurrency

Many people want to make money with cryptocurrency because they have heard the success stories of people who became millionaires from zero.If you...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!