4 0
New “ModStealer” Malware Targets Crypto Wallets, Evades Antivirus Detection
A new malware named "ModStealer" targets crypto wallets and remains undetected by major antivirus software.
- Active on macOS, Windows, and Linux systems for about a month before detection.
- Disguised as fake job recruiter ads targeting developers, employing deception similar to social engineering scams.
- Aims to steal sensitive data, including credential files, configuration details, and certificates.
- Utilizes a heavily obfuscated JavaScript file with NodeJS to evade traditional security tools.
Operation Details
- Establishes persistence on macOS using Apple's launchctl tool, running in the background as a LaunchAgent.
- Data sent to a server in Finland but linked to German infrastructure to obscure the operator's location.
- Targets 56 different browser wallet extensions, including Safari, to extract private keys.
- Capable of capturing clipboard data, taking screenshots, and executing remote code for full device control.
This discovery comes amid other security breaches in the crypto sector, such as a recent NPM supply chain attack aiming to hijack transactions across chains like Ethereum (ETH) and Solana (SOL).
- Attackers stole approximately $1,000, which is minor compared to larger heists.
Mosyle researchers suggest ModStealer may be part of a "Malware-as-a-Service" (MaaS) operation, indicating the need for behavior-based defenses alongside signature-based protections.