Mosyle Uncovers New Cross-Platform Malware That Bypasses Antivirus Detection

Mosyle Uncovers New Cross-Platform Malware That Bypasses Antivirus Detection

Mosyle Uncovers New Cross-Platform Malware That Bypasses Antivirus Detection


### ModStealer: A Novel Cross-Platform Infostealer Endangering macOS, Windows, and Linux

Recent discoveries by Mosyle, a prominent entity in Apple device management and security, have exposed a new and advanced infostealer malware referred to as ModStealer. This malware has been noted for circumventing detection by major antivirus systems and presents a serious threat to users across various operating systems, including macOS, Windows, and Linux.

#### Delivery Mechanism and Targeting

ModStealer is chiefly disseminated through fraudulent job recruiter ads aimed at developers. This tactic exploits the trust associated with job postings, rendering it a particularly deceptive threat. The malware employs a heavily obfuscated JavaScript file crafted in NodeJS, enabling it to evade signature-based defenses commonly used by numerous antivirus products.

#### Data Exfiltration Abilities

The main goal of ModStealer is data exfiltration. It specifically seeks out sensitive information such as cryptocurrency wallets, credential files, configuration details, and certificates. Mosyle’s evaluation uncovered that the malware contains pre-installed code aimed at targeting 56 distinct browser wallet extensions, including those found in Safari, with the goal of retrieving private keys and sensitive account details.

In addition to data theft, ModStealer possesses advanced functionalities like clipboard capture, screen capture, and remote code execution. The latter capability is particularly alarming, as it provides attackers nearly complete dominion over compromised devices.

#### Evasion and Persistence

One of the most troubling features of ModStealer is its covert operation. On macOS, it secures persistence by exploiting Apple’s launchctl tool, embedding itself as a LaunchAgent. This enables it to sustain a long-lasting undetectable presence on the victim’s device, perpetually surveilling activities and exfiltrating confidential data to a remote server. Mosyle researchers have determined that the server facilitating the stolen data appears to be situated in Finland but connects to infrastructure in Germany, likely to conceal the operators’ genuine location.

#### Malware-as-a-Service Structure

Mosyle posits that ModStealer embodies the characteristics of Malware-as-a-Service (MaaS), where malware creators develop and sell malicious packages to affiliates with limited technical expertise. This business model has surged in popularity among cybercriminal organizations, especially in the dissemination of infostealers like ModStealer. Earlier this year, Jamf noted a 28% rise in infostealer malware, marking it as the predominant type of malware impacting Mac users in 2025.

#### Significance of Comprehensive Security Strategies

The rise of ModStealer serves as a grave reminder for security experts, developers, and end users that reliance solely on signature-based defenses is inadequate. Ongoing monitoring, behavior-oriented defenses, and awareness of emerging threats are crucial to staying ahead of adversaries.

#### Signs of Compromise

For those wary of potential infections, Mosyle has shared the following signs of compromise:

– **SHA256 hash**: 8195148d1f697539e206a3db1018d3f2d6daf61a207c71a93ec659697d219e84
– **Filename**: .sysupdater[.]dat
– **C2 server IP address**: 95.217.121[.]184

As the threat environment continues to shift, vigilance and proactive security measures will be essential in reducing the risks posed by sophisticated malware such as ModStealer.