Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Windows Subsystem for Linux is now Open Source

    June 6, 2025

    IoT Security: Preventing a Possible Disaster

    June 6, 2025

    Is ChatGPT Plus still worth $20 when the free version packs so many premium features?

    June 6, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Hackers use fake Ledger apps to steal Mac users’ seed phrases
    Cyber Security

    Hackers use fake Ledger apps to steal Mac users’ seed phrases

    MichaBy MichaMay 25, 2025No Comments4 Mins Read
    Hackers use fake Ledger apps to steal Mac users’ seed phrases


    Introduction

    Cyber security threats continue to evolve, with cybercriminals increasingly targeting macOS users who utilize hardware wallets like Ledger. Recent reports reveal alarming tactics involving fake Ledger apps designed to harvest sensitive seed phrases—keys to unlocking digital assets. To safeguard your cryptocurrency investments, understanding these threats is crucial. Dive into the details of the latest cyber campaigns targeting Ledger wallets and the essential steps you can take to prevent falling victim.

    Understanding the Threat: Cybercriminals Targeting Ledger Users

    Cybercriminal campaigns are deploying fake Ledger apps specifically designed to target macOS users. Recent research from Moonlock Lab highlights how these malicious applications use malware to steal seed phrases, which protect access to cryptocurrency wallets. This is a significant escalation in tactics as these campaigns can lead to the complete loss of digital assets.

    What is a Seed Phrase?

    A seed phrase, also known as a recovery phrase, consists of 12 or 24 random words that serve as a secure way to recover your digital assets. If your wallet is lost or your access password is forgotten, this phrase can be used to regain access. Storing your seed phrase offline and keeping it confidential are best practices to ensure your assets remain safe.

    Recent Attack Campaigns: Evolution of the Ledger Threats

    In August 2024, cybercriminals began to target macOS users more aggressively through attacks aimed at stealing seed phrases, as outlined in the ongoing Moonlock Lab analysis. Earlier, these malicious apps primarily stole passwords and wallet details, but they have now expanded their functionality dramatically, enabling attackers to drain victims’ wallets.

    The Rise of ‘Odyssey’ Malware

    In March of the current year, Moonlock Lab identified a new macOS stealer named ‘Odyssey’, propagated by a threat actor using the alias ‘Rodrigo.’ The Odyssey malware specifically replaces the legitimate Ledger Live app on victims’ devices, facilitating more effective attacks.

    How the Attack Works

    This malware displays a phishing page embedded within a fake Ledger app, prompting victims to input their 24-word seed phrase following a false “critical error” message. By tricking users into entering their seed phrases, attackers can easily access all their stored digital assets.

    Growing Trends: Copycat Attacks

    The effectiveness of the Odyssey malware has drawn malicious attention across dark web forums, leading to various copycat attacks. One notable example is the AMOS stealer, which employs similar techniques. A recent AMOS campaign involved installing a trojanized Ledger Live clone app named ‘JandiInstaller.dmg.’ This DMG file bypassed Gatekeeper systems, ultimately displaying phishing screens akin to those used by Rodrigo’s campaign.

    Research Findings: Newer Campaigns to Watch Out For

    Recently, cybersecurity researchers at Jamf uncovered another concerning trend: a campaign utilizing a PyInstaller-packed binary within a DMG file that downloaded a phishing page embedded via iframe in a fake Ledger Live interface. This campaign shares similarities with AMOS, employing hybrid, multi-faceted tactics to target browser data and system information while specifically hunting for Ledger phishing opportunities.

    Protecting Your Ledger Wallet

    To protect your Ledger wallets against these ongoing threats, here are some vital tips:

    • Download Only from Official Sources: Always download the Ledger Live app from the official Ledger website. Avoid third-party apps that may be disguised as legitimate Ledger applications.
    • Verify Before Providing Your Seed Phrase: You should only enter your seed phrase during wallet restoration or when setting up new devices. Always use the physical Ledger device for this process, not any app or website.
    • Stay Informed: Regularly check for updates on security trends and potential threats in the cybersecurity landscape.

    FAQ

    Question 1: What should I do if I suspect my Ledger wallet has been compromised?

    If you believe your Ledger wallet has been compromised, immediately stop using the device and any associated apps. Use a different, secure device to change any relevant passwords and review your accounts for unauthorized transactions.

    Question 2: How can I recognize a phishing attempt targeting my Ledger wallet?

    Signs of phishing attempts can include unsolicited messages, emails, or applications requesting your seed phrase or sensitive information. Always cross-check web addresses, as phishing sites often create slight variations in URLs.

    Question 3: Are hardware wallets like Ledger the safest way to store cryptocurrency?

    While hardware wallets like Ledger provide an excellent level of security through cold storage, no method is entirely foolproof. It’s crucial to remain educated about evolving cyber threats and take proactive measures to safeguard your assets.



    Read the original article

    0 Like this
    Apps Fake hackers Ledger MAC Phrases Seed Steal users
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleGoogle Reveals Android XR And Gemini Integration At I/O 2025
    Next Article Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time

    Related Posts

    Cyber Security

    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

    June 6, 2025
    Cyber Security

    Google’s upcoming Gemini Kingfall is allegedly a coding beast

    June 6, 2025
    Cyber Security

    Don’t let dormant accounts become a doorway for cybercriminals

    June 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.