<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Archives | CrispyBull</title>
	<atom:link href="https://crispybull.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://crispybull.com/tag/malware/</link>
	<description>Your Heads Up for Tomorrow</description>
	<lastBuildDate>Wed, 22 Apr 2026 15:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://crispybull.com/wp-content/uploads/2023/08/cropped-logo_crispybull_icon_520x520-32x32.jpg</url>
	<title>Malware Archives | CrispyBull</title>
	<link>https://crispybull.com/tag/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Lazarus Expands Attack Strategy With Mach-O Man macOS Malware</title>
		<link>https://crispybull.com/lazarus-mach-o-man-macos-malware-crypto-targets/</link>
					<comments>https://crispybull.com/lazarus-mach-o-man-macos-malware-crypto-targets/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 15:10:33 +0000</pubDate>
				<category><![CDATA[Scam News]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security alert]]></category>
		<guid isPermaLink="false">https://crispybull.com/?p=130450</guid>

					<description><![CDATA[<p>A new Lazarus-linked campaign is targeting crypto executives and fintech firms with macOS malware. The Mach-O Man toolkit uses fake meeting invites and social engineering to steal credentials and gain system access. The attack highlights growing risks tied to trusted communication channels.</p>
<p>The post <a href="https://crispybull.com/lazarus-mach-o-man-macos-malware-crypto-targets/">Lazarus Expands Attack Strategy With Mach-O Man macOS Malware</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-group has-background" style="background-color:#eceaea"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<div style="height:10px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h4 class="wp-block-heading" id="h-tl-dr" style="margin-top:0px">       <em>TL;DR</em></h4>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<ul class="wp-block-list td-arrow-list">
<li>Lazarus is deploying a new macOS malware kit called Mach-O Man to target crypto and fintech businesses</li>



<li>The campaign relies on fake meeting invites and social engineering to trick victims into running malicious Terminal commands</li>



<li>The malware focuses on credential theft and system access, increasing risk for executives and high-privilege users</li>
</ul>



<div style="height:10px" aria-hidden="true" class="wp-block-spacer"></div>
</div></div>
</div></div>
</div></div>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-default"/>



<p><em>A new campaign linked to the <strong>Lazarus Group</strong> is putting fresh pressure on crypto and fintech firms. It uses fake meetings and <strong>macOS malware</strong> to steal credentials and sensitive business data. Researchers say <strong>Lazarus Mach-O Man</strong> is the latest toolkit in that playbook, targeting high-value users who are more likely to hold wallet access, internal credentials, or privileged corporate information.</em></p>



<p><em>The campaign stands out because it does not depend on a software vulnerability. Instead, it relies on social engineering that gets the victim to do the attacker’s work. In reported cases, targets are contacted over Telegram, often through compromised or trusted-looking accounts. Once contact is established, they are pushed into fake meeting invites or support flows that end with them copying a malicious command into Terminal.</em></p>



<h2 class="wp-block-heading" id="h-how-the-attack-starts">How the attack starts</h2>



<p>According to security researchers, the lures mimic Zoom, Microsoft Teams, or Google Meet pages and claim there is a connection or verification issue that requires a quick fix. That “fix” is actually a command sequence that downloads and runs <strong>macOS malware</strong> on the Mac. The campaign has focused on financial organizations, including cryptocurrency, venture capital, and blockchain entities, with particular emphasis on crypto executives.</p>



<p>This approach matters because it lowers the technical barrier for the attackers while raising the risk for companies. A single employee or executive can expose browser sessions, credentials, system secrets, and internal access. They simply follow the instructions and the attacker does not need to break through traditional defenses first.</p>



<p class="has-text-color has-link-color wp-elements-70f7f0f43d8c45da0298b4b7dcc44d66" style="color:#17832b"><strong><em>>>> Read more: <a href="https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/" target="_blank" rel="noreferrer noopener">ModStealer Malware Uses Fake Job Ads to Target Crypto Wallets</a></em></strong></p>



<h2 class="wp-block-heading" id="h-what-the-malware-does">What the malware does</h2>



<p>Researchers describe the toolkit as a collection of Mach-O binaries that perform different tasks after execution. <a href="https://socprime.com/active-threats/north-koreas-safari-campaign-delivers-rats/" type="link" id="https://socprime.com/active-threats/north-koreas-safari-campaign-delivers-rats/" target="_blank" rel="noreferrer noopener nofollow">SOC Prime</a> said the malware chain includes components used to profile the infected host, create persistence through launch agents or daemons, and harvest browser extensions, cookies, Keychain data, and other credentials. In some reporting, the stolen data is then exfiltrated through Telegram-linked infrastructure.</p>



<p>That is what makes <strong>Lazarus Mach-O Man</strong> more than a simple infostealer headline. The toolkit appears modular, business-focused, and designed to support deeper compromise inside organizations. One successful infection can unlock access to trading systems, wallets, cloud services, and internal communications.</p>



<h2 class="wp-block-heading" id="h-part-of-a-broader-2026-pattern">Part of a broader 2026 pattern</h2>



<p>The new campaign also fits a wider shift already documented this year by major cybersecurity firms. Google Cloud’s Mandiant described a February intrusion in which a compromised Telegram account, a fake Zoom meeting, ClickFix attack technique, and AI-assisted deception were used against a crypto-sector target. Microsoft separately detailed a Sapphire Sleet operation that used fake recruiter outreach and malicious macOS files disguised as Zoom or SDK updates to steal passwords, financial data, and cryptocurrency-related information.</p>



<p>That continuity is important because it suggests these attacks are not isolated experiments. They are part of a maturing <a href="https://crispybull.com/how-north-korea-steals-crypto/" type="link" id="https://crispybull.com/how-north-korea-steals-crypto/" target="_blank" rel="noreferrer noopener">North Korea-linked tradecraft</a> pattern that combines trusted communication channels, believable business lures, and macOS-native malware. This approach is difficult to detect, especially once a victim decides to cooperate.</p>



<p class="has-text-color has-link-color wp-elements-aebbd9724cb290c7d217b14748c3e1eb" style="color:#17832b">><strong><em>>> Read more: <a href="https://crispybull.com/north-korean-hackers-crypto-malware-etherhiding/">North Korean Hackers Use EtherHiding to Hide Crypto Malware </a></em></strong></p>



<h2 class="wp-block-heading" id="h-why-crypto-firms-should-pay-attention">Why crypto firms should pay attention</h2>



<p>Some crypto-focused coverage has tied the malware wave to recent large DeFi thefts. However, the clearest evidence in the reporting is about the intrusion method itself rather than direct proof that Mach-O Man drove each exploit. Even so, the risk to the sector is obvious. Crypto companies remain attractive targets. Executives, developers, and operations staff often hold the exact mix of wallet access, privileged credentials, and fast-moving authority that attackers want.</p>



<p><em>For that reason, <strong>Lazarus Mach-O Man</strong> is best viewed as a warning about operational security, not just malware naming. The campaign shows how a routine meeting invite can become the entry point for a much broader compromise. This risk is especially high in firms where one MacBook may connect personal messaging, production systems, and valuable digital assets.</em></p>
<p>The post <a href="https://crispybull.com/lazarus-mach-o-man-macos-malware-crypto-targets/">Lazarus Expands Attack Strategy With Mach-O Man macOS Malware</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://crispybull.com/lazarus-mach-o-man-macos-malware-crypto-targets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wallet Drains via Fake dYdX Packages Show How Crypto Attacks Are Shifting Off-Chain</title>
		<link>https://crispybull.com/fake-dydx-packages-crypto-supply-chain-attack/</link>
					<comments>https://crispybull.com/fake-dydx-packages-crypto-supply-chain-attack/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 07 Feb 2026 14:41:15 +0000</pubDate>
				<category><![CDATA[Scam News]]></category>
		<category><![CDATA[dydx]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://crispybull.com/?p=120356</guid>

					<description><![CDATA[<p>Malicious software packages posing as dYdX-related tools were used to drain user wallets without exploiting any protocol vulnerability. The incident highlights how crypto supply chain attacks increasingly target off-chain software rather than smart contracts.</p>
<p>The post <a href="https://crispybull.com/fake-dydx-packages-crypto-supply-chain-attack/">Wallet Drains via Fake dYdX Packages Show How Crypto Attacks Are Shifting Off-Chain</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h4 class="wp-block-heading" id="h-tl-dr"><em>TL;DR</em></h4>



<ul class="wp-block-list">
<li>A <strong>crypto supply chain attack</strong> used malicious software packages linked to the dYdX protocol to drain user wallets without exploiting the protocol or its smart contracts.</li>



<li>Attackers targeted off-chain tooling and dependencies, showing how wallet losses increasingly stem from compromised software rather than on-chain flaws.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><em>Malicious software packages posing as tools linked to dYdX, a decentralized platform for crypto perpetual trading, were recently used to drain user wallets, without exploiting any vulnerability in the protocol itself. The incident reflects a broader pattern. <strong>Supply chain attacks</strong> are increasingly responsible for user losses across the crypto industry.</em></p>



<p><em>Rather than targeting smart contracts, attackers compromised the tools used to access them. This shift has made <strong>off-chain crypto attacks</strong> a primary risk vector, even as on-chain security improves.</em></p>



<h2 class="wp-block-heading" id="h-what-actually-happened">What actually happened</h2>



<p>Attackers published <strong>malicious npm packages</strong> and <strong>malicious PyPI packages</strong>, presenting them as legitimate tools connected to <strong>dYdX</strong>. They hosted the packages on public repositories that developers routinely use to download prebuilt software components, much like marketplaces for reusable code.</p>



<p>Once installed, the software acted as <strong>wallet draining malware</strong>. It quietly collected <a href="https://crispybull.com/what-is-a-crypto-wallet/" type="link" id="https://crispybull.com/what-is-a-crypto-wallet/" target="_blank" rel="noreferrer noopener">wallet credentials</a> and enabled unauthorized transfers, often without triggering any visible errors or alerts. Any wallet that interacted with the compromised code had to be considered exposed.</p>



<p>The packages were eventually removed, but anyone who installed them before the removal was already at risk.</p>



<h2 class="wp-block-heading" id="h-this-wasn-t-a-protocol-failure">This wasn’t a protocol failure</h2>



<p>The incident illustrates the <strong>difference between on-chain and off-chain crypto attacks</strong>. The dYdX protocol continued to operate normally, and the attack did not involve any smart contract vulnerability.</p>



<p>Instead, the compromise occurred entirely in the surrounding software layer. <strong>Off-chain crypto attacks</strong> exploit trust in developer tools and dependencies, areas that protocol audits do not cover. Hence, protocol security alone is no longer sufficient to prevent losses.</p>



<h2 class="wp-block-heading" id="h-the-shift-from-on-chain-exploits-to-off-chain-attacks">The shift from on-chain exploits to off-chain attacks</h2>



<p>As smart contract security has improved, direct on-chain exploits have become more expensive and less reliable. So, attackers now focus on softer targets outside the protocol boundary and move the crypto attacks off-chain. </p>



<p>Dependency poisoning and fake tooling allow attackers to bypass hardened contracts and reach private keys directly, without engaging with blockchain defenses at all.</p>



<p class="has-text-color has-link-color wp-elements-139b2c1a78dd219351cce66f446ba66f" style="color:#17832b"><strong><em>>>> Read more: <a href="https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/">ModStealer Malware Uses Fake Job Ads to Target Crypto Wallets</a></em></strong></p>



<h2 class="wp-block-heading" id="h-why-crypto-is-especially-vulnerable-to-supply-chain-attacks">Why crypto is especially vulnerable to supply-chain attacks</h2>



<p><strong>Crypto&#8217;s software supply chain</strong> depends heavily on open-source packages and rapid iteration. Dependencies are often pulled from public repositories with limited verification.</p>



<p>These conditions make <strong>developer dependency attacks</strong> particularly effective because a single compromised package can expose private keys and trigger immediate losses.</p>



<p>To understand <strong>how these crypto supply chain attacks work</strong>, one must first recognize that the most fragile components often sit outside the blockchain itself.</p>



<h2 class="wp-block-heading" id="h-what-this-means-for-users-and-developers">What this means for users and developers</h2>



<p>The incident underscores how wallet security in crypto now extends beyond phishing scams or flawed smart contracts. Increasingly, what puts funds at risk comes down to whether a user can actually trust the third-party software relied on.</p>



<p>For developers, <strong>developer dependency attacks</strong> turn routine choices into real risk decisions. Pulling a package, trusting an update, or skipping verification can now carry direct financial consequences.</p>



<p class="has-text-color has-link-color wp-elements-f45c6aa4e3bc6f46f1aa4c91e0c1ab60" style="color:#17832b"><strong><em>>>> Related: <a href="https://crispybull.com/cardano-wallet-phishing-fake-eternl-desktop/">Cardano Wallet Phishing Uses Fake Eternl Desktop Installer</a></em></strong></p>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>The dYdX-related package incident helps explain <strong>why wallets get drained without smart contract hacks</strong>, even when protocols operate as intended. The losses did not stem from a failure of blockchain design, but from assumptions made outside it.</p>



<p>Seen in that light, a <strong>supply chain attack</strong> is less an anomaly than a byproduct of how crypto software is built and distributed today. Protocol security matures, so attackers increasingly exploit the trust placed in tooling, dependencies, and update paths sitting off-chain.</p>
<p>The post <a href="https://crispybull.com/fake-dydx-packages-crypto-supply-chain-attack/">Wallet Drains via Fake dYdX Packages Show How Crypto Attacks Are Shifting Off-Chain</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://crispybull.com/fake-dydx-packages-crypto-supply-chain-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Invisible ModStealer Malware Spreads Through Fake Job Ads to Drain Crypto Wallets</title>
		<link>https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/</link>
					<comments>https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/#comments</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 12:16:03 +0000</pubDate>
				<category><![CDATA[Hot Wire]]></category>
		<category><![CDATA[Scam News]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security alert]]></category>
		<guid isPermaLink="false">https://crispybull.com/?p=83161</guid>

					<description><![CDATA[<p>A new undetectable malware named ModStealer is spreading through fake job ads to steal crypto from browser-based wallets across Windows, Mac, and Linux.</p>
<p>The post <a href="https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/">Invisible ModStealer Malware Spreads Through Fake Job Ads to Drain Crypto Wallets</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>A new cyber threat known as <strong>ModStealer malware</strong> is raising alarms across the crypto industry. Security researchers say the malicious software bypasses traditional antivirus tools, targets browser-based wallets, and spreads through fraudulent job ads. Its stealth and cross-platform reach make it one of the most dangerous strains of crypto wallet malware seen in recent years.</em></p>



<h2 class="wp-block-heading" id="h-how-modstealer-malware-works">How ModStealer Malware Works</h2>



<p>Unlike many threats that stick to a single platform, ModStealer is a <strong>cross-platform malware</strong>. It is capable of infecting Windows, macOS, and Linux systems. Once installed, it scans browsers for sensitive data, including login credentials and private keys from <a href="https://crispybull.com/what-is-a-crypto-wallet/" target="_blank" rel="noreferrer noopener">crypto wallets</a>. What makes it especially dangerous is its ability to function as an <strong>undetectable malware</strong>. It slips past antivirus tools, leaving victims unaware their assets are at risk.</p>



<h2 class="wp-block-heading" id="h-fake-job-ads-fuel-the-spread">Fake Job Ads Fuel the Spread</h2>



<p>Cybercriminals are relying on more than just technical sophistication. Researchers discovered that <strong>fraudulent job listings</strong> are being used as the entry point for the ModStealer malware. Unsuspecting job seekers, eager to apply, often download malicious files disguised as application documents or software tools. This blend of social engineering and stealthy coding creates a powerful combination. It exploits human trust as much as it exploits machine vulnerabilities.</p>



<p class="has-text-color has-link-color wp-elements-e811df1789416b12352887689628cb70" style="color:#17832b"><em><strong>>>> Read more: <a href="https://crispybull.com/north-korea-crypto-hackers/">North Korea Crypto Hackers Undermine the Crypto Ecosystem</a></strong></em></p>



<h2 class="wp-block-heading" id="h-why-modstealer-stands-out">Why ModStealer Stands Out</h2>



<p>Many malware campaigns in the past have targeted digital assets, but ModStealer pushes the threat landscape further. It combines social manipulation with invisible code execution. This allows it to bridge the gap between <strong>crypto phishing attacks</strong> and advanced endpoint evasion. According to <strong>Mosyle malware research</strong>, this capability highlights how attackers are evolving techniques to hit both users and the infrastructure they rely on.</p>



<h2 class="wp-block-heading" id="h-expert-and-market-reactions">Expert and Market Reactions</h2>



<p>Cybersecurity firms warn that this type of attack is especially damaging for investors who rely on <strong>browser-based wallets</strong> for day-to-day transactions. Because these wallets are integrated into web browsers, they are often more exposed than hardware-based solutions. Industry experts caution that the malware’s cross-platform reach means no group of users, whether on Windows, Mac, or Linux, is safe. The discovery has quickly been flagged as one of the most pressing <strong>cybersecurity threats for crypto</strong> users this year.</p>



<h2 class="wp-block-heading" id="h-protecting-against-modstealer">Protecting Against ModStealer</h2>



<p>Defending against the ModStealer malware requires both technical and behavioral precautions. Job seekers should double-check postings through official company websites before downloading attachments. For those holding digital assets, switching from browser wallets to hardware devices adds a critical layer of protection. Keeping operating systems updated and enabling advanced endpoint protection software can also help reduce exposure. Ultimately, <strong>crypto wallet security</strong> depends as much on vigilance against scams as on strong digital defenses.</p>



<p class="has-text-color has-link-color wp-elements-1d38845b2d9c5049b0f34798f7f44269" style="color:#17832b"><strong><em>>>> Read more: <a href="https://crispybull.com/how-blockchain-fights-deepfake-scams-in-crypto-and-media/">How Blockchain Fights Deepfake Scams in Crypto and Media </a></em></strong></p>



<p><em>The rise of <strong>ModStealer malware</strong> highlights how cybercriminals are combining technical stealth with social engineering to drain cryptocurrency wallets. By spreading through malicious employment ads while remaining undetected by antivirus tools, it represents a new level of threat to digital asset holders. For investors and everyday users alike, the lesson is clear: protecting crypto requires more than antivirus software. It demands constant awareness of the human and technical risks shaping today’s digital economy.</em></p>



<details class="wp-block-details is-layout-flow wp-block-details-is-layout-flow"><summary><strong>Readers’ frequently asked questions</strong></summary>
<h3 class="wp-block-heading" id="h-how-can-i-tell-if-i-ve-been-infected-with-modstealer-malware">How can I tell if I’ve been infected with ModStealer malware?</h3>



<p>ModStealer is designed to avoid detection. However, warning signs include unusual browser activity, missing crypto funds, or suspicious logins to your wallet accounts. Running a system scan with advanced endpoint security software may help, though hardware wallet use is the safest prevention.</p>



<h3 class="wp-block-heading" id="h-which-types-of-crypto-wallets-are-most-at-risk-from-modstealer">Which types of crypto wallets are most at risk from ModStealer?</h3>



<p>The ModStealer malware specifically targets browser-based wallets, such as extensions and in-browser applications. These are more exposed than hardware wallets because they store keys on devices connected to the internet.</p>



<h3 class="wp-block-heading" id="h-what-steps-can-i-take-to-avoid-downloading-malware-from-fake-job-ads">What steps can I take to avoid downloading malware from fake job ads?</h3>



<p>Always apply for positions directly through official company websites or verified platforms. Avoid downloading attachments from unknown recruiters and double-check email domains for legitimacy. If in doubt, cross-reference the job listing on trusted career portals.</p>
</details>



<details class="wp-block-details is-layout-flow wp-block-details-is-layout-flow"><summary><strong>What Is In It For You? Action items you might want to consider</strong></summary>
<h3 class="wp-block-heading" id="h-strengthen-your-crypto-wallet-security">Strengthen your crypto wallet security</h3>



<p>If you use browser-based wallets, consider moving long-term holdings to hardware wallets. This reduces exposure to malware targeting online systems.</p>



<h3 class="wp-block-heading" id="h-verify-job-postings-before-applying">Verify job postings before applying</h3>



<p>Always cross-check employment listings with official company websites or trusted career platforms. Avoid downloading attachments from unknown recruiters to reduce exposure to fraudulent job ads.</p>



<h3 class="wp-block-heading" id="h-upgrade-your-cybersecurity-tools">Upgrade your cybersecurity tools</h3>



<p>Ensure your operating system and software are up to date. Consider using advanced endpoint security solutions that monitor unusual activity, since traditional antivirus may not detect new strains like ModStealer.</p>
</details>
<p>The post <a href="https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/">Invisible ModStealer Malware Spreads Through Fake Job Ads to Drain Crypto Wallets</a> appeared first on <a href="https://crispybull.com">CrispyBull</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://crispybull.com/modstealer-malware-fake-job-ads-crypto-wallets/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
