Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
New ModStealer Malware Steals Crypto Keys Across All Systems

New ModStealer Malware Steals Crypto Keys Across All Systems

CryptotaleCryptotale2025/09/12 09:00
By:Kelvin
New ModStealer Malware Steals Crypto Keys Across All Systems image 0
  • ModStealer malware steals crypto wallet data on macOS, Windows, and Linux systems.
  • It primarily spreads through fake recruiter ads using undetected JavaScript code tasks.
  • Researchers warn that antivirus tools miss the malware, highlighting the need for new defenses.

A newly discovered malware named ModStealer is targeting crypto users on macOS, Windows, and Linux, threatening wallets and access credentials. Apple-focused security firm Mosyle uncovered the strain after finding it remained undetected by major antivirus engines for nearly a month. According to sources, the malware was uploaded to VirusTotal, an online platform that checks files for malicious content.

New ModStealer Malware Steals Crypto Keys Across All Systems image 1 New Malware Threat: ModStealer Targets Crypto Wallets

Researchers have uncovered ModStealer, a cross-platform malware that evades antivirus checks and drains browser-based wallets. Distributed via fake recruiter ads, it poses a direct threat to users’ private keys and…

— CryptoTale (@cryptotalemedia) September 12, 2025

Mosyle reported that ModStealer is designed with pre-loaded code capable of extracting private keys, certificates, credential files, and browser-based wallet extensions. The firm discovered targeting logic for multiple wallets, including those installed on Safari and Chromium-based browsers.

The researchers said ModStealer persists on macOS by registering as a background agent. They traced the malware’s server infrastructure to Finland but believe its route passes through Germany to obscure its operators’ location.

Distribution Through Deceptive Recruitment

The analysis revealed that ModStealer is spreading through fake recruiter ads targeting developers. Attackers send job-related tasks embedded with a heavily obfuscated JavaScript file designed to bypass detection. That file contains pre-loaded scripts aimed at 56 browser wallet extensions, including Safari, enabling the theft of keys and sensitive data.

Mosyle confirmed that both Windows and Linux systems are also vulnerable. This makes ModStealer one of the few active threats with a broad cross-platform reach.

The firm stated that ModStealer aligns with the Malware-as-a-Service (MaaS) profile. Under this model, cybercriminals build ready-made infostealer kits and sell them to affiliates who may lack technical skills. This trend has accelerated attacks in 2025, with Jamf reporting a 28% rise in infostealer activity this year.

Mosyle noted, “For security professionals, developers, and end users alike, this serves as a stark reminder that signature-based protections alone are not enough. Continuous monitoring, behavior-based defenses, and awareness of emerging threats are essential to stay ahead of adversaries.”

Expanding Capabilities of Infostealers

ModStealer has quite a few other capabilities besides stealing extensions. It will hijack the clipboard by substituting copied wallet addresses for those belonging to the attackers. This allows the attackers to execute remote code, capture screens, or exfiltrate files. 

On macOS, malware leverages LaunchAgents to ensure persistence. This keeps the malicious program working even after system reboots, posing a long-term risk to the infected machines.

Mosyle explained that ModStealer’s build closely resembles the structure of other MaaS platforms. Affiliates gain access to full-function malware kits and can customize their attacks. The firm added that this model is fueling the expansion of infostealers across different operating systems and industries.

Earlier in 2025, attacks through malicious npm packages, compromised dependencies, and fake extensions revealed how adversaries enter into otherwise trusted environments for developers. ModStealer, being the next step in such evolution, manages to embed itself in legitimate-looking workflows so that it becomes even harder to detect.


Related:

A Shift From Code Bugs to Trust Manipulation

Security breaches have historically emerged in the crypto scene because of vulnerabilities in smart contract or wallet software. But ModStealer is involved in a paradigm shift. Its attackers are no longer merely exploiting bugs or zero-days; they’re hijacking trust.

They manipulate how developers interact with recruiters, assume tools are safe, and rely heavily on known antivirus protections. This approach makes the human element the weakest link in cybersecurity.

Security experts advise a stringent approach. Users must isolate wallet activities by using separate machines or virtual environments. Developers should scrutinize recruiter tasks very carefully and investigate sources and repositories before executing the code. They also recommend moving away from purely signature-based antivirus systems and toward behavior-based antivirus detection tools, EDR solutions, and runtime monitoring.

Other expert recommendations include regular audits of browser extensions, restricted permissions, and software updates. They argue that doing so will reduce the ModStealer-based threat exposure.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

While Bitcoin Hyper And Maxi Doge Trend Online, BlockDAG Powers Global Mining Network In 130+ Countries

Discover top presale crypto updates as BlockDAG nears $400M with 130+ countries mining, while Maxi Doge hits $1.7M and Bitcoin Hyper raises $13M.BlockDAG Starts Global Adoption Ahead Of LaunchMaxi Doge Presale Gains Speed With AI-Powered RewardsBitcoin Hyper Pushes Layer-2 Vision For BitcoinWhy BlockDAG is the Top Presale Crypto Over MAXI & HYPER

Coinomedia2025/09/13 06:09
While Bitcoin Hyper And Maxi Doge Trend Online, BlockDAG Powers Global Mining Network In 130+ Countries