uXZ GY Jn Y ixK jVLPcQDib

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application for managing crypto assets via Ledger cold wallets.

Since August 2024, Moonlock Lab has been tracking a malware campaign that initially focused on stealing passwords and wallet details but has now evolved to extract seed phrases, enabling attackers to drain victims’ funds.

This surge in sophisticated attacks, including the recent ByBit heist, highlights the growing exploitation of trust in cold wallet security tools, turning them into vectors for cybercrime.

With four active campaigns currently underway, the crypto community faces a heightened risk as threat actors refine their phishing tactics and malware delivery mechanisms to bypass Ledger Live’s robust defenses.

Sophisticated Phishing Campaigns

The evolution of these attacks is exemplified by the Atomic macOS Stealer (AMOS), which deploys a fake Ledger Live app through a malicious DMG file, such as JandiInstaller.dmg.

Once installed, it replaces the legitimate app and displays deceptive alerts about “suspicious activity” or “critical errors,” tricking users into entering their 24-word seed phrases.

These phrases are then transmitted to attacker-controlled servers via dedicated URLs like hxxps://aimplyhired.com/receive.php.

Another notable threat, the Odyssey stealer by actor Rodrigo, introduced advanced phishing pages since March 2025, fetching usernames from local paths and presenting convincing error messages to lure victims.

macOS Users
HTML phishing page

Meanwhile, dark web forums buzz with chatter about “anti-Ledger” features, as seen in posts by @mentalpositive, although their latest samples lack the advertised phishing capabilities, suggesting future updates.

From Data Theft to Seed Phrase Heists

A campaign uncovered by Jamf Threat Labs further reveals a stealthy DMG file hosted at hxxp://138.68.93.230/Ledger-Live.dmg, using PyInstaller-packed binaries to evade detection while fetching phishing pages through iframes.

These multi-stage attacks often combine AppleScript and Python to harvest sensitive data ranging from browser credentials to crypto wallet configurations before exfiltrating it to command-and-control (C2) servers.

Techniques like VM detection to avoid sandboxes and fake GUI dialogs to gain sudo privileges underscore the technical sophistication of these threats.

The AMOS campaign, in particular, orchestrates an elaborate con by terminating the legitimate Ledger Live app, installing a trojanized version, and guiding users through a series of phishing pages that culminate in seed phrase theft.

macOS Users
Ledger Live account.

These pages, dynamically generating input fields for recovery phrases, encode data in base64 before transmitting it, while displaying misleading messages like “App corrupted” to delay suspicion.

According to the Report, This direct assault on Ledger Live’s security, which otherwise locks seed phrases beyond typical malware reach, demonstrates how attackers rely on social engineering to bypass technical safeguards.

As these campaigns proliferate, crypto owners must remain vigilant, downloading Ledger Live only from official sources, avoiding sharing seed phrases, and staying informed via trusted research like Moonlock Lab’s updates.

The growing interest in anti-Ledger schemes on dark web platforms signals that the next wave of attacks is already in motion, posing a persistent threat to millions of users worldwide.

Indicators of Compromise (IoCs)

IoC Type Value Description
Hash (SHA-256) a5255d7a4f7fb67a0682d1827cfba80c3e296b23b4ef450beea832c1292e12d8 AMOS JandiInstaller.dmg, initiates phishing
Hash (SHA-256) 3992d69d17a2cd460c99f98f9dd1e61bc56ce362be1bab3d3a574c414a7b6ad2 malicious DMG file from Jamf’s article
URL hxxp://138.68.93.230/Ledger-Live.dmg Download link for malicious DMG file
URL hxxps://aimplyhired.com/receive.php AMOS C2 server for seed phrase exfiltration via POST

Related Articles

Back to top button