Bitget App
Trade smarter
Open
HomepageSign up
Bitget>
News>
New ModStealer Malware Steals Crypto Keys Across All Systems

New ModStealer Malware Steals Crypto Keys Across All Systems

Cryptotale2025/09/12 09:00
By: Kelvin
BTC-0.07%
New ModStealer Malware Steals Crypto Keys Across All Systems image 0
  • ModStealer malware steals crypto wallet data on macOS, Windows, and Linux systems.
  • It primarily spreads through fake recruiter ads using undetected JavaScript code tasks.
  • Researchers warn that antivirus tools miss the malware, highlighting the need for new defenses.

A newly discovered malware named ModStealer is targeting crypto users on macOS, Windows, and Linux, threatening wallets and access credentials. Apple-focused security firm Mosyle uncovered the strain after finding it remained undetected by major antivirus engines for nearly a month. According to sources, the malware was uploaded to VirusTotal, an online platform that checks files for malicious content.

New ModStealer Malware Steals Crypto Keys Across All Systems image 1 New Malware Threat: ModStealer Targets Crypto Wallets

Researchers have uncovered ModStealer, a cross-platform malware that evades antivirus checks and drains browser-based wallets. Distributed via fake recruiter ads, it poses a direct threat to users’ private keys and…

— CryptoTale (@cryptotalemedia) September 12, 2025

Mosyle reported that ModStealer is designed with pre-loaded code capable of extracting private keys, certificates, credential files, and browser-based wallet extensions. The firm discovered targeting logic for multiple wallets, including those installed on Safari and Chromium-based browsers.

The researchers said ModStealer persists on macOS by registering as a background agent. They traced the malware’s server infrastructure to Finland but believe its route passes through Germany to obscure its operators’ location.

Distribution Through Deceptive Recruitment

The analysis revealed that ModStealer is spreading through fake recruiter ads targeting developers. Attackers send job-related tasks embedded with a heavily obfuscated JavaScript file designed to bypass detection. That file contains pre-loaded scripts aimed at 56 browser wallet extensions, including Safari, enabling the theft of keys and sensitive data.

Mosyle confirmed that both Windows and Linux systems are also vulnerable. This makes ModStealer one of the few active threats with a broad cross-platform reach.

The firm stated that ModStealer aligns with the Malware-as-a-Service (MaaS) profile. Under this model, cybercriminals build ready-made infostealer kits and sell them to affiliates who may lack technical skills. This trend has accelerated attacks in 2025, with Jamf reporting a 28% rise in infostealer activity this year.

Mosyle noted, “For security professionals, developers, and end users alike, this serves as a stark reminder that signature-based protections alone are not enough. Continuous monitoring, behavior-based defenses, and awareness of emerging threats are essential to stay ahead of adversaries.”

Expanding Capabilities of Infostealers

ModStealer has quite a few other capabilities besides stealing extensions. It will hijack the clipboard by substituting copied wallet addresses for those belonging to the attackers. This allows the attackers to execute remote code, capture screens, or exfiltrate files. 

On macOS, malware leverages LaunchAgents to ensure persistence. This keeps the malicious program working even after system reboots, posing a long-term risk to the infected machines.

Mosyle explained that ModStealer’s build closely resembles the structure of other MaaS platforms. Affiliates gain access to full-function malware kits and can customize their attacks. The firm added that this model is fueling the expansion of infostealers across different operating systems and industries.

Earlier in 2025, attacks through malicious npm packages, compromised dependencies, and fake extensions revealed how adversaries enter into otherwise trusted environments for developers. ModStealer, being the next step in such evolution, manages to embed itself in legitimate-looking workflows so that it becomes even harder to detect.


Related:

A Shift From Code Bugs to Trust Manipulation

Security breaches have historically emerged in the crypto scene because of vulnerabilities in smart contract or wallet software. But ModStealer is involved in a paradigm shift. Its attackers are no longer merely exploiting bugs or zero-days; they’re hijacking trust.

They manipulate how developers interact with recruiters, assume tools are safe, and rely heavily on known antivirus protections. This approach makes the human element the weakest link in cybersecurity.

Security experts advise a stringent approach. Users must isolate wallet activities by using separate machines or virtual environments. Developers should scrutinize recruiter tasks very carefully and investigate sources and repositories before executing the code. They also recommend moving away from purely signature-based antivirus systems and toward behavior-based antivirus detection tools, EDR solutions, and runtime monitoring.

Other expert recommendations include regular audits of browser extensions, restricted permissions, and software updates. They argue that doing so will reduce the ModStealer-based threat exposure.

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

HBAR Poised for Significant Surge as Key Developments Unfold

In Brief HBAR's surge is projected with ETF listings on the DTCC platform. The token has breached key resistance levels, suggesting a bullish trend. Institutional interest in HBAR signals strong growth potential.

Cointurk2025/09/13 21:15
Altcoins Outperform Bitcoin as Investor Risk Appetite Grows

In Brief Altcoin interest grows due to potential Federal Reserve interest rate cuts. Bitcoin experiences reduced dominance, spotlighting altcoins' stronger appeal. Prospective regulatory approval may enhance ETF market presence, aiding altcoin adoption.

Cointurk2025/09/13 21:15

Trending news

More
1
HBAR Poised for Significant Surge as Key Developments Unfold
2
Altcoins Outperform Bitcoin as Investor Risk Appetite Grows

Crypto prices

More
Bitcoin
Bitcoin
BTC
$115,955.04
-0.16%
Ethereum
Ethereum
ETH
$4,661.57
-0.21%
XRP
XRP
XRP
$3.12
+0.59%
Tether USDt
Tether USDt
USDT
$1
-0.02%
Solana
Solana
SOL
$240.7
+0.72%
BNB
BNB
BNB
$931.12
+0.73%
USDC
USDC
USDC
$0.9996
-0.01%
Dogecoin
Dogecoin
DOGE
$0.2908
+7.31%
Cardano
Cardano
ADA
$0.9324
+2.92%
TRON
TRON
TRX
$0.3498
-0.41%
How to sell PI
Bitget lists PI – Buy or sell PI quickly on Bitget!
Trade now
Become a trader now?A welcome pack worth 6200 USDT for new users!
Sign up now
Trade smarter