Logo Logo
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
    • About Us
    • Contact
Reading: Stealth Crypto Malware Discovered: Researchers Reveal Undetectable Browser Wallet Threat
Share
The Crypto BluntThe Crypto Blunt
Font ResizerAa
  • Home
  • Read History
  • Technology
  • Login
  • Blog
  • Contact
Search
  • Pages
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Personalized
    • Read History
  • Categories
    • Technology
  • Categories
    • Technology
  • Categories
    • Technology
Have an existing account? Sign In
Follow US
  • Pages
  • Pages
  • Pages
  • Personalized
  • Personalized
  • Personalized
  • Categories
  • Categories
  • Categories

Home - News - Stealth Crypto Malware Discovered: Researchers Reveal Undetectable Browser Wallet Threat

News

Stealth Crypto Malware Discovered: Researchers Reveal Undetectable Browser Wallet Threat

Hardy Zad
Last updated: September 12, 2025 6:42 am
Hardy Zad
Published: September 12, 2025
Share
Stealth Crypto Malware Discovered: Researchers Reveal Undetectable Browser Wallet Threat

Security firm Mosyle has revealed ModStealer, a cross-platform malware that avoids antivirus software and targets browser wallets.

A novel malware variant capable of evading antivirus inspections and extracting data from cryptocurrency wallets on Windows, Linux, and macOS platforms was found on Thursday.

Dubbed ModStealer, it had been undetected by major antivirus engines for almost a month when it was disclosed. Its package had been delivered through fake job recruiter advertisements that targeted developers.

According to Mosyle, distributing the malware via fake job recruiter advertisements was a deliberate strategy. It was intended to target developers who likely already had or were using Node.js environments.

According to Shān Zhang, chief information security officer at blockchain security firm Slowmist, ModStealer “avoids detection by mainstream antivirus solutions and poses substantial risks to the broader digital asset ecosystem.” Zhang told that “unlike conventional stealers, ModStealer is notable for its multi-platform support and a secretive ‘zero-detection’ execution chain.”

Malware Targets Browser Crypto Wallets and System Credentials After Execution

After its execution, the malware scans for browser-based crypto wallet extensions, system credentials, and digital certificates.

The malware then “exfiltrates the data to remote C2 servers,” explained Zhang. A Command and Control (C2) server is a centralized system used by cybercriminals to manage compromised devices within a network. It acts as the operational hub for malware and cyberattacks, receiving stolen data and issuing new commands.

On Apple hardware that runs macOS, the malware is established using a “persistence method.” This allows it to run automatically each time the computer starts by camouflaging itself as a background helper program.

The configuration allows it to operate discreetly without the user’s awareness. According to the disclosure, indicators of infection include a hidden file named “.sysupdater.dat” and connections to a suspicious server.

Zhang noted that while common on their own, these persistence methods, when combined with strong obfuscation, make ModStealer resistant to signature-based security tools.

The discovery of ModStealer follows a related warning from Ledger CTO Charles Guillemet. He had disclosed on Tuesday that attackers had compromised an NPM developer account and tried to disseminate malicious code that could silently substitute crypto wallet addresses during transactions, which put funds at risk across numerous blockchains.

Although the attack was discovered early and ultimately failed, Guillemet later noted that the compromised packages had been linked to Ethereum, Solana, and other chains.

Hours after his initial warning, Guillemet tweeted that if your funds are in a software wallet or on an exchange, you’re “one code execution away from losing everything.”

When asked about the new malware’s potential impact, Zhang warned that ModStealer poses a “direct threat to crypto users and platforms.”

According to Zhang, “private keys, seed phrases, and exchange API keys may be compromised for end-users, leading to a direct loss of assets.” He added that for the crypto industry, “the large-scale theft of browser extension wallet data could set off widespread on-chain exploits, which would erode trust and increase supply chain risks.”

TAGGED:CryptocryptocurrencyMalware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
ByHardy Zad
Follow:
Hardy Zad is our in house crypto researcher and writer, delving into the stories which matter from crypto and blockchain markets being used in the real world.
Previous Article Coinbase Challenges SEC Transparency: Gensler's Missing Text Messages Spark Accountability Demand Coinbase Challenges SEC Transparency: Gensler’s Missing Text Messages Spark Accountability Demand
Next Article Bitcoin Consolidation Phase: Novogratz Reports Treasury Companies Shifting Focus to Altcoins Bitcoin Consolidation Phase: Novogratz Reports Treasury Companies Shifting Focus to Altcoins
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FacebookLike
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
RSS FeedFollow
The Crypto BluntLogo
Subscribe to our newsletter to get our newest articles instantly!
Most Read
Stablecoin Turmoil Could Disrupt ECB Policy, Dutch Central Bank Chief Warns

Stablecoin Turmoil Could Disrupt ECB Policy, Dutch Central Bank Chief Warns

What is GateToken?

What is GateToken (GT)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethereum? 

What is Ethereum (ETH)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethereum Classic?

What is Ethereum Classic (ETC)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethena?

What is Ethena (ENA)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Ethena USDe?

What is Ethena USDe? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Dogecoin?

What is Dogecoin(DOGE)? What It Is, Overview, Works, Guides, Everything You Need to Know

what is Dai

What is Dai (DAI)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Chainlink?

What is Chainlink (LINK)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Cronos?

What is Cronos(CRO)? What It Is, Overview, Works, Guides, Everything You Need to Know

thecryptoblunt-telegram
Logo

The most recent real-time news about crypto at The Crypto Blunt. Latest trusted news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more.

NEWS
  • Explained
  • News
  • AI
  • Blockchain
COMPANY
  • About Us
  • Career
GET IN TOUCH
  • Contact
  • Disclaimer
  • Privacy Policy
  • Cookie Policy

© The Crypto Blunt 2025. All Rights Reserved.

© The Crypto Blunt. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?