Scan to download
BTC $64,710.00 -4.78%
ETH $1,857.26 -5.81%
BNB $587.11 -5.42%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $538.92 -4.96%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $64,710.00 -4.78%
ETH $1,857.26 -5.81%
BNB $587.11 -5.42%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $538.92 -4.96%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

malware

macOS Trojan Upgrade: Disguised as Signed Applications for Distribution, Users Face More Subtle Risks

The Chief Information Security Officer of Slow Fog, 23pds, shared that the MacSync Stealer malware, active on the macOS platform, has shown significant evolution, with user assets already being stolen.The forwarded article mentions that it has upgraded from early low-threshold inducement methods like "dragging to terminal" and "ClickFix" to code signing and notarized Swift applications by Apple, significantly enhancing its concealment. Researchers found that the sample spreads in the form of a disk image named zk-call-messenger-installer-3.9.2-lts.dmg, disguising itself as instant messaging or utility applications to induce users to download. Unlike previous versions, the new version does not require any terminal operations from the user; instead, a built-in Swift helper pulls and executes encoded scripts from a remote server, completing the information theft process.The malware has completed code signing and has been notarized by Apple, with the developer team ID being GNJLS3UYZ4, and the relevant hash has not been revoked by Apple during analysis. This means it has a higher "trustworthiness" under the default macOS security mechanisms, making it easier to bypass user vigilance. The research also found that the DMG is unusually large, containing bait files such as LibreOffice-related PDFs to further reduce suspicion.Security researchers point out that such information-stealing Trojans often target browser data, account credentials, and cryptocurrency wallet information. As malware begins to systematically abuse Apple’s signing and notarization mechanisms, the risks of phishing and private key leakage for cryptocurrency users in the macOS environment are on the rise.

The new ModStealer malware targets cross-platform cryptocurrency wallets

ChainCatcher news, according to Cointelegraph, based on research by security company Mosyle, the newly discovered malware ModStealer is targeting cryptocurrency users on macOS, Windows, and Linux systems, stealing wallet private keys and login credentials.The malware went undetected by mainstream antivirus engines for nearly a month after being uploaded to the VirusTotal platform. ModStealer spreads through fake job advertisements, particularly targeting Web3 developers. Once users install the malicious package, the program embeds itself to run in the system background, stealing clipboard data, taking screenshots, and executing remote commands. Its code specifically targets wallet extensions for Safari and Chromium browsers.ModStealer maintains persistence on macOS by registering a background agent, with servers located in Finland but potentially masking the operator's origin through German infrastructure. The technical director of blockchain security company Hacken advises developers to verify the authenticity of the hiring party and domain names, require sharing test tasks through public code repositories, and open files in a temporary virtual machine without wallets or keys. It emphasizes the need to strictly differentiate between the development environment and wallet storage environment, use hardware wallets, and verify transaction addresses on the device's display.
app_icon
ChainCatcher Building the Web3 world with innovations.