התחל במצב לא מקוון עם האפליקציה Player FM !
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
Manage episode 484421007 series 3645080
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered, these phrases give attackers full access to empty the victims’ wallets.
We examine how this threat evolved from simple data-stealing to focused seed phrase phishing. From the "Odyssey" stealer introduced by the threat actor Rodrigo to the infamous Atomic macOS Stealer (AMOS), this malware ecosystem now includes advanced evasion tactics, realistic UI clones, and deceptive error messages designed to lure users into handing over their credentials.
We also discuss the techniques these malware variants use—such as fake DMG installers, malvertising, Terminal-based execution bypasses, and phishing overlays—and highlight how cybercriminals are exploiting trust in cold wallet systems to bypass traditional defenses. Plus, we spotlight emerging threats like "mentalpositive" and the dark web chatter about an evolving anti-Ledger market.
Whether you're a crypto enthusiast or just concerned about digital hygiene, this episode offers critical insight and actionable advice to help you avoid becoming the next victim of this dangerous campaign.
149 פרקים
Manage episode 484421007 series 3645080
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered, these phrases give attackers full access to empty the victims’ wallets.
We examine how this threat evolved from simple data-stealing to focused seed phrase phishing. From the "Odyssey" stealer introduced by the threat actor Rodrigo to the infamous Atomic macOS Stealer (AMOS), this malware ecosystem now includes advanced evasion tactics, realistic UI clones, and deceptive error messages designed to lure users into handing over their credentials.
We also discuss the techniques these malware variants use—such as fake DMG installers, malvertising, Terminal-based execution bypasses, and phishing overlays—and highlight how cybercriminals are exploiting trust in cold wallet systems to bypass traditional defenses. Plus, we spotlight emerging threats like "mentalpositive" and the dark web chatter about an evolving anti-Ledger market.
Whether you're a crypto enthusiast or just concerned about digital hygiene, this episode offers critical insight and actionable advice to help you avoid becoming the next victim of this dangerous campaign.
149 פרקים
כל הפרקים
×
1 Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign 55:17

1 Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs 45:59

1 Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure 1:05:22

1 Oxford City Council Breach Exposes 21 Years of Data 35:51

1 Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777 38:12

1 GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain 35:21

1 Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk 53:38

1 Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme 50:51

1 Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel 54:53

1 KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed 1:07:13

1 DragonForce Ransomware: The Evolving Threat to Healthcare Data 39:12

1 Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab? 1:02:01

1 SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms 1:03:42

1 TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming 1:01:04

1 Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows 44:04
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.