Crypto wallets under threat as researchers uncover new malware

來源 Cryptopolitan

Mosyle security firm has discovered a malware strain capable of bypassing antivirus software detection and stealing information from crypto browser wallets. The malware spreads via fake recruiter ads online.

Major antivirus software did not detect ModStealer malware for almost a month before reporting it. It targeted developers already working with Node.js environments. ModStealer scans for browser-based crypto wallet extensions, system credentials, and digital certificates before sending the stolen information to a command and control (C2) server. The C2 server acts as a central hub for scammers to manage compromised devices. 

ModStealer exploits Node.js to steal private keys

According to research by 9to5Mac, ModStealer malware disguised itself on macOS systems as a background helper program to achieve persistence, ensuring it ran automatically every time the computer restarted. The infected systems had a file labeled sysupdater.dat and unusual connections to suspicious servers. 

Shan Zhang, chief information security officer at SlowMist, a blockchain security company, revealed that ModStealer evades detection by mainstream antivirus software and poses a significant risk to the digital asset ecosystem. He added that the malware has multi-platform support and stealth execution, which differentiates it from traditional malware. 

Charles Guillemet, Ledger CTO, revealed another similar attack that allowed attackers to compromise a Node Package Manager (npm) developer account in an attempt to spread malicious code, which may silently replace wallet addresses during transactions. He cautioned that such incidents show how vulnerable blockchain-related code libraries can be.

“The attackers’ mistakes caused crashes in CI/CD pipelines, which led to early detection and limited impact. Still, this is a clear reminder: if your funds sit in a software wallet or on an exchange, you’re one code execution away from losing everything. Supply chain compromises remain a powerful malware delivery vector, and we’re also seeing more targeted attacks emerge.”

Charles Guillemet, Ledger CTO

Zhang warned that the ModStealer malware presents a direct threat to crypto users and platforms, adding that for individual users, the compromise of private keys, seed phrases, and exchange API keys may lead to immediate losses. He also noted that mass theft of browser extension wallet data could fuel large-scale on-chain exploits and weaken user trust while increasing risks across crypto supply chains. 

New cyber exploits target crypto wallets data

Guillemet discovered that the JavaScript ecosystem was compromised by a massive supply chain attack targeting libraries such as chalk, strip-ansi, color-convert, and error-ex. The affected packages have been downloaded more than one billion times a week, which presents a severe threat to the blockchain ecosystem. 

The malicious software worked as a crypto-clipper, meaning it could replace wallet addresses in network requests or modify transactions initiated via MetaMask and other wallets. The attack was discovered via a minor CI/CD pipeline build failure. The researchers later found that the malware used two strategies. The first strategy was passive address swapping, which monitored outgoing traffic requests and replaced wallet addresses with the hijacker’s controlled ones. It used the Levenshtein distance algorithm, which selects lookalike addresses, making it visually difficult to detect changes.

Another method the attackers utilized was active transaction hijacking, which modifies pending transactions in memory before forwarding them for user approval once a crypto wallet is detected. This tricked users into signing transfers directly to the attacker’s wallet.

Similar incidents have been reported on Cryptopolitan recently, where ReversingLabs’ research revealed another malware concealed on Ethereum smart contracts. The attack was downloaded via npm packages, including colortoolv2 and mimelib2, which acted as second-stage agents, fetching the malicious software stored on the Ethereum blockchain. 

ReversingLabs revealed that the malicious software bypassed security scans by hiding the malicious URLs within the Ethereum smart contracts. It was later downloaded through fake GitHub repositories, which posed as cryptocurrency trading bots. The operation was linked to Stargazer’s Ghost Network, a system of coordinated attacks that boost the legitimacy of malicious repositories.

If you're reading this, you’re already ahead. Stay there with our newsletter.

免責聲明:僅供參考。 過去的表現並不預示未來的結果。
placeholder
日幣匯率巨震!日本央行10月升息機率大增,日幣未來或升值至142?政治動盪不改日本央行升息立場,對沖基金大舉買進日幣看漲期權。
作者  Tony Chou
9 月 10 日 週三
政治動盪不改日本央行升息立場,對沖基金大舉買進日幣看漲期權。
placeholder
黃金、白銀繼續衝高,澳新銀行:2025年底金價將漲至3800美元!2025年底,金價有望漲至3800美元,銀價可望漲至50美元。
作者  Tony Chou
9 月 10 日 週三
2025年底,金價有望漲至3800美元,銀價可望漲至50美元。
placeholder
華邦電(2344)繼續攀升!記憶體漲價潮引爆巨量,外資持續買超近期台股多頭氣勢強勁,加權指數屢創新高,其中記憶體族群成為市場焦點。受惠於利基型記憶體報價自9月起全面上漲,華邦電(2344)近期人氣爆棚,11日成交量爆出31.12萬張巨量,榮登台股成交量冠軍寶座,盤中股價勁揚逾4%,觸及25.7元,改寫超過一年新高,今(12)日開盤再現漲勢,開26.15,不到半小時漲到26.55。
作者  財富進化論
10 小時前
近期台股多頭氣勢強勁,加權指數屢創新高,其中記憶體族群成為市場焦點。受惠於利基型記憶體報價自9月起全面上漲,華邦電(2344)近期人氣爆棚,11日成交量爆出31.12萬張巨量,榮登台股成交量冠軍寶座,盤中股價勁揚逾4%,觸及25.7元,改寫超過一年新高,今(12)日開盤再現漲勢,開26.15,不到半小時漲到26.55。
placeholder
康霈*反彈無力險守200元大關!三大法人對後市看法現分歧​投資慧眼Insights-康霈苦吞兩根跌停後,今日盤中一度反彈逾3%,但動能不足只能險守200元大關。
作者  投資指南針
9 小時前
​投資慧眼Insights-康霈苦吞兩根跌停後,今日盤中一度反彈逾3%,但動能不足只能險守200元大關。
placeholder
金居股價玩雲霄飛車 衝高8%後大殺6%!13萬張巨量震盪 AI光環撐不住了?​投資慧眼Insights-金居(8358)今日股價出現大幅震盪行情,多空激戰爆出13萬張天量。
作者  投資指南針
6 小時前
​投資慧眼Insights-金居(8358)今日股價出現大幅震盪行情,多空激戰爆出13萬張天量。
goTop
quote