Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Modstealer malware bypasses antivirus, targets crypto wallets

Security researchers say the strain scans systems for wallets, credentials, and certificates across all major operating systems.

byKerem Gülen
September 12, 2025
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A newly discovered malware strain called ModStealer has the capacity to bypass antivirus software and steal data from cryptocurrency wallets across Windows, Linux, and macOS operating systems.

The malware was revealed Thursday and initially reported by 9to5Mac, based on information from security firm Mosyle.

ModStealer cryptocurrency malware operated undetected for nearly one month

ModStealer had been operational for nearly a month before detection, remaining hidden from prominent antivirus engines during this period. The malware spreads through deceptive job recruiter advertisements specifically targeting software developers.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Mosyle indicated this distribution method ensures the malware reaches individuals likely to have Node.js environments installed, making them prime targets for cryptocurrency-related attacks.

Multi-platform support enables widespread targeting

Shān Zhang, chief information security officer at blockchain security firm Slowmist, stated that ModStealer “evades detection by mainstream antivirus solutions and poses significant risks to the broader digital asset ecosystem.”

Zhang noted that “Unlike traditional stealers, ModStealer stands out for its multi-platform support and stealthy ‘zero-detection’ execution chain,” enabling attacks across multiple operating systems simultaneously.

Comprehensive system scanning targets crypto assets

After execution, ModStealer initiates a thorough scan of infected systems, searching for browser-based cryptocurrency wallet extensions, system credentials, and digital certificates. On macOS systems, the malware employs a persistence mechanism by masquerading as a background helper program.

This persistence ensures automatic execution upon system startup, maintaining continuous operation without user intervention or awareness.

How to detect potential ModStealer infections

Users can identify possible ModStealer infections by checking for these indicators:

  • Hidden file named “.sysupdater.dat” on the system,
  • Outbound network connections to suspicious or unknown servers,
  • Unexpected background processes running at startup,
  • Unusual cryptocurrency wallet extension behavior,
  • Unauthorized access attempts to digital certificates.

Zhang explained that “Although common in isolation, these persistence methods combined with strong obfuscation make ModStealer resilient against signature-based security tools.”

Direct threat to cryptocurrency users and platforms

Zhang emphasized ModStealer’s potential impact on individual users and the broader cryptocurrency ecosystem. For individual users, “private keys, seed phrases, and exchange API keys may be compromised, resulting in direct asset loss.”

For the cryptocurrency industry, Zhang warned that “mass theft of browser extension wallet data could trigger large-scale on-chain exploits, eroding trust and amplifying supply chain risks.”

How to protect cryptocurrency wallets from ModStealer

Cryptocurrency users can implement these protective measures:

  • Use hardware wallets instead of browser extensions for significant holdings,
  • Enable multi-factor authentication on all cryptocurrency accounts,
  • Regularly update antivirus software and enable real-time scanning,
  • Avoid clicking suspicious job recruitment advertisements,
  • Monitor system startup processes for unauthorized applications,
  • Backup seed phrases offline in secure physical locations,
  • Use separate devices for cryptocurrency transactions when possible.

Featured image credit

Tags: CryptocurrencyModstealer

Related Posts

Chinese hackers use Claude to run large scale cyberespionage

Chinese hackers use Claude to run large scale cyberespionage

November 14, 2025
Hackers exploit Cisco and Citrix zero days to gain admin access

Hackers exploit Cisco and Citrix zero days to gain admin access

November 13, 2025
Microsoft uncovers Whisper Leak: A flaw that lets spies your AI chats

Microsoft uncovers Whisper Leak: A flaw that lets spies your AI chats

November 10, 2025
Google urges Gmail users to abandon passwords for passkeys

Google urges Gmail users to abandon passwords for passkeys

November 10, 2025
This Samsung Galaxy phone needs and immediate update

This Samsung Galaxy phone needs and immediate update

November 7, 2025
AMD confirms critical RDSEED flaw in Zen 5 CPUs

AMD confirms critical RDSEED flaw in Zen 5 CPUs

November 4, 2025

LATEST NEWS

Falcon 9’s 500th reflown launch sets the stage for Starlink’s V3 ambitions

A reporter let AI agents run a fake company and chaos followed

Samsung’s tri-fold phone looks almost ready for its US debut

Apple plans spring launch for base iPhone 18 and new iPhone 18e

Anthropic CEO warns rising AI autonomy poses critical risks

Apple halts Mac Pro development and ends M4 Ultra plans

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.