According to the safety company of security devices, a new strain of malware to steal cryptographic wallet data slides in front of all the main antivirus engines.
Nicknamed Modstealer, Infostealer has been alive for almost a month without detection by virus scanners. Mosyle researchers say that malicious software is distributed through malware recruiters targeting developers and use a highly obscured nodejs script to get around the defenses based on the signature.
This means that the malware code has been blurred and superimposed with tips that make it illegible to signing -based antivirus tools. Since these defenses are based on the identification of the “models” of recognizable code, the obscurity hides them, allowing the script to execute without detection.
In practice, this allows attackers to slide malicious instructions in a system while bypassing traditional security scanks which would generally take a simpler and unchanged code.
Unlike most malware -oriented software, Modstealer is also a multiplemeter, also striking Windows and Linux environments. Its main mission is that of data exfiltration, and the code is presumed to include preloaded instructions to target 56 browser portfolio extensions designed to extract keys, identification information and private certificates.
The malicious software also supports the diversion of clipboard, screenshot and the execution of the remote code, giving attackers the possibility of entering an almost total control of infected devices. On MacOS, persistence is carried out via Apple’s launch tool, integrated as a launch.
Mosyle declares that construction is aligned with the profile of “Malware as a service”, where developers sell ready to use tools to affiliates with limited technical expertise. The model led to an increase in infosteralists this year, the JAMF declaring an increase of 28% in 2025 only.
The discovery occurs in the heels of recent attacks focused on the NPM where malicious plans like Colortotoolsv2 and Mimelib2 have used intelligent contracts Ethereum to hide malware on the second floor. In both cases, the attackers took advantage of the obscure and an infrastructure of confidence development to bypass the detection.
Modstealer extends this model beyond the package benchmarks, showing how cybercriminals increase their techniques through ecosystems to compromise the developer’s environments and directly target cryptographic wallets.