Informations
Jump to content

Lorem Ipsum...

Click to Dismiss this Notification
Ładowanie danych...
  • Fake Ledger Live Apps: How Hackers Are Stealing Crypto Wallets

    Fake Ledger Live Apps: How Hackers Are Stealing Crypto Wallets

    A new wave of malware attacks is targeting macOS users with fake Ledger Live apps designed to steal seed phrases and drain cryptocurrency wallets. Cybersecurity experts warn that these sophisticated scams are becoming increasingly dangerous.


    How the Scam Works

    1. Malware Installation: Hackers infect devices using tools like Atomic macOS Stealer, which lurks on compromised websites.

    2. App Replacement: The malware swaps the legitimate Ledger Live app with a fake version.

    3. Phishing Pop-Up: Victims see a fake security alert prompting them to enter their 24-word recovery phrase.

    4. Instant Theft: Once entered, the seed phrase is sent to hackers, who immediately access and empty the wallet.


    Key Findings from Moonlock’s Report

    • Over 2,800 infected websites have been identified distributing this malware.

    • Four active campaigns have been tracked since August 2023.

    • Hackers are improving tactics—some now claim to have "anti-Ledger" capabilities, though not all advertised features work yet.


    Dark Web Activity

    Cybercriminals on underground forums are actively promoting malware with:
    Seed phrase extraction
    Wallet impersonation
    Real-time crypto theft

    Moonlock warns:


    How to Protect Yourself

    Only download Ledger Live from
    .
    Never enter your seed phrase into any pop-up or website—even if it looks legitimate.
    Use a hardware wallet for an extra layer of security.
    Enable two-factor authentication (2FA) where possible.


    Recent Example

    A recent tweet from Moonlock exposed one of these scams in action:

     


    Why This Matters

    • Ledger is a top hardware wallet brand, making it a prime target.

    • Seed phrases = total wallet access—once stolen, funds are irrecoverable.

    • Mac users at risk—many assume macOS is immune to malware, but attacks are rising.


    Final Thoughts

    As crypto theft evolves, staying vigilant is crucial. Always verify app sources and never share recovery phrases. Hackers are refining their methods—don’t become their next victim.

     Share



    User Feedback

    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.

    Guest

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

spacer.png

Disable AdBlock
The popup will be closed in 5 seconds...