When you purchase through links on our site, we may earn an affiliate commission. This doesn’t affect our editorial independence.
A recently identified malware named ModStealer targets cryptocurrency users on macOS, Windows, and Linux. About a month ago, VirusTotal identified and listed the new malware. However, it remained unnoticed by leading antivirus software for nearly a month, revealing security flaws.
ModStealer is designed to capture private keys, certificates, credential files, and browser wallet information. On macOS, the malware operates by taking advantage of Apple’s launchctl feature, registering itself as a background launch agent to discreetly transfer data to a distant server. The server infrastructure was identified as originating from Finland but seemed to be routed via Germany to hide its operators.
Essential Information for Crypto Wallet Users
Cross-platform malware such as ModStealer increases the risks for cryptocurrency users, making even reliable systems like macOS vulnerable. Hardware wallets and stringent isolation are essential safeguards.
How ModStealer Disseminates
The malware spreads via counterfeit job recruitment advertisements aimed at developers, reflecting a wider pattern of social engineering. The attacks are often directed at Web3 employees. After installation, ModStealer integrates and collects clipboard information, captures screenshots, and runs remote commands, giving attackers complete access to affected devices.
Stephen Ajayi from the security company Hacken informed that “test tasks” have become a frequent delivery method. He encouraged developers to verify recruiters, accept tasks solely through public repositories, and open files only in temporary virtual machines without wallets or sensitive information present.

Image credit: Freemindtronics
Ajayi emphasised the importance of a separation between the development environment ‘dev box’ and the wallet environment ‘wallet box.’ He highlighted compartmentalisation as a protective measure.
Recommended Cryptocurrency Practices for Users
Ajayi highlighted hardware wallets as a key protection, advising users to verify transaction addresses directly on their device screens before signing. He also suggested using a specific browser profile or a different device for wallet activities, ensuring engagement only with reliable extensions.
Additional safeguards include activating multifactor authentication and using FIDO2 passkeys when available. There is also a need for greater vigilance as malware-as-a-service tactics become more widespread.
ModStealer alerts us to social engineering tactics like phishing and fraudulent job advertisements. These have become some of the most perilous threats in cryptocurrency security for both developers and users.
Check Out Previous Posts on this Site
Hidden Dangers of App Ads: How Malware Can Infiltrate Your Phone
Increasing Tide of Cryptocurrency Malware
The discovery of ModStealer comes after a series of notable exploits. A week ago, Ledger’s CTO Charles Guillemet advised users to stop on-chain transactions following a supply chain attack on the Node Package Manager (NPM). Even though that incident was resolved rapidly, with merely around $1,000 taken, the level of risk was great.
Security experts also highlighted a ReversingLabs report indicating threat actors inserted harmful instructions into Ethereum smart contracts associated with NPM packages. Collectively, these events emphasise how attackers are progressively focusing on the developer supply chain as an entrance into crypto ecosystems.
As ModStealer has been spreading undetected for weeks, experts caution that behavioural detection and zero-trust measures should replace dependence on antivirus software. With malware evolving, the cryptocurrency sector is encountering an intensified security arms race.