Krutika Adani
The malware targets unsuspecting users to steal their credentials by posing as legitimate software. Once downloaded, it starts cracking crypto passwords on the device.
The malware targets Macbook and Mac PC users.
Users must check twice before entering their keys, recovery phrases, or passwords. Users should also not download trusted software from third-party sites.
Hardware wallets can provide a degree of protection but are ineffective if users enter passkeys into malware, mistaking it for hardware wallet software.
Wallet private keys and recovery phrases must not be stored digitally. Users should also change their crypto wallets and recovery phrases from time to time.