Cthulhu Stealer Targets Mac User’s Crypto Wallets

26th August, 2024

Users of Apple Macs are alerted about a new strain of malware called ‘Cthulhu Stealer’ that steals users’ details including cryptocurrency wallets. The malware targets cryptocurrency wallets including MetaMask, Coinbase, and Binance and operates explicitly on macOS devices. Apple devices were known to be less vulnerable to these viruses than Windows. However, this new malware proves that Mac users are no longer immune to the malware.

MacOS Malware on the Rise

MacOS

The macOS system has always been considered one of the most secure systems and it was believed that it was not affected by viruses at all. However, this perception has been changing in a few years. On August 22, Cado Security identified a malware-as-a-service (MaaS) targeting macOS named ‘Cthulhu Stealer’. For several years, MacOS was prominent for being secure, but macOS malware has been trending in recent years.  

The Cthulhu Stealer disguises itself as being a useful application that users might need, CleanMyMac and Adobe GenP. When downloaded, it presents itself as an Apple disk image (DMG) file. Once the file is opened, the users are taken to enter the system password using macOS’s command line, running AppleScript and JavaScript

How Cthulhu Stealer Works

If the user inputs the password of the system, another window pops up to enter the password to many popular cryptocurrency wallets beginning with MetaMask. Apart from the MetaMask, it targets wallets from Coinbase, Wasabi, Electrum, Atomic, Binance, and Blockchain Wallet.

When the credentials are obtained the malware saves the stolen data in text files and it continues to collect more details about the target’s system including their IP address and the version of macOS the system is running.

Crypto Wallets in the Crosshairs

Tara Gould, the Cado Security researcher, pointed out that the primary use of Cthulhu Stealer is to steal credentials, mainly crypto wallets. Gould also said that the primary objective of the Cthulhu Stealer is to steal the credentials and the wallets including game accounts and various stores.

Cthulhu Stealer is also similar to Atomic Stealer, which was identified in 2023, aiming to target Apple devices. According to Gould, the developer behind Cthulhu Stealer probably rewrote Atomic Stealer’s code to build this new variant.

Malware-as-a-Service

Cthulhu Stealer can be rented, making it more dangerous.  A cyber security report reveals that the malware is only being rented out at $500 monthly through the Telegram. These affiliates then use the malware to attack, with the developer taking shares of the profits from the deployments.  However, issues concerning payment have also been raised leading to accusations of an exit scam by affiliates.

A Growing Threat to Mac Users

This is just one of the new threats that Mac users are experiencing as Cthulhu Stealer enters. On August 23rd, Cointelegraph published another malware called AMOS, capable of copying the Ledger Live software. This an application for managing Ledger hardware wallets. This means that the distinction is even harder to notice for the user and points to increasing complexity of macOS malware.

Apple has acknowledged to this increasing threat. Earlier, the tech giant has released a new version of the next-generation macOS with the purpose of making difficult for users to bypass the Gatekeeper protections. Gatekeeper is a security measure that helps to prevent unauthorised programs from launching on Mac system.

Conclusion

With the upsurge of malware attacks specifically on macOS, users should be wary of the programs that they install. To deal with increasing cyber attackers, digital assets on Macs need to be up-to-date with the latest in security fixes. As hacking continues to advance Mac users are also at risk from the threat of malware and must tackle the issue head on.

If you liked this article, then please subscribe to our YouTube Channel for web3 video tutorials. You can also find us on Twitter and Instagram.

How to Create a Kaspa Wallet: A Step-by-Step Guide

Creating a Kaspa wallet is the first baby step, to securely manage and store your Kaspa currency. If you’re wondering how to create a Kaspa wallet, you’ve come to the right place.

In this article, we’ll guide you step-by-step on how to create a Kaspa wallet. If this is your first time setting up any crypto wallet, you’ll find this guide especially helpful.

So, let’s get started!

What is Kaspa?

Kaspa is a decentralized cryptocurrency system, with an emphasis on its potential scalability and its speed.

Kaspa Official Website Bitmala

It is built on a blockDAG (Directed Acyclic Graph) protocol, and this enables it to work on different blocks at a time. This feature allows Kaspa to set high TPS without the loss of decentralization and security.

The growing recognition of Kaspa has brought the attention of the crypto users to have their Kaspa wallets to save, transfer and accept Kaspa tokens.

What is Kaspa Wallet?

kaspa wallet Bitmala

Before plunging into the process of creating the Kaspa wallet, it’s important to know what exactly a Kaspa wallet is.

Kaspa wallets are the digital form of our physical wallets where we store, send, and receive the money but instead of physical money, we transact with the Kaspa (KAS) cryptocurrency.

Since we understood what a Kaspa wallet is, we now dive into the different types of Kaspa wallets.

Types of Kaspa Wallets

Desktop Wallets

The first type is Desktop Wallets. These wallets can easily be downloaded and installed on your computer as a software application. For the most part, they are perfect for users who regularly need to access their Kaspa tokens from a computer. In addition to having features like transaction history, synchronization with the Kaspa network, and total control over private keys, they are renowned for their high level of security.

Mobile Wallets

Next up, we have Mobile Wallets.

As its name suggests they are portable wallets that can easily be installed on our smartphones. Its main feature being portability it provides users with convenience and allows them to access their Kaspa tokens on the go. It also provides good security with its biometrics as well as pin codes.

Hardware Wallets

Hardware Wallets are physical devices that store Kaspa (KAS) private keys offline, protecting against hacking. They offer high security with features like PINs and recovery phrases, giving users full control of their funds. Hardware wallets are compatible with many cryptocurrencies and are ideal for long-term, secure storage.

Web Wallets

Web wallets are browser-accessible online services that let users transfer, receive, and save Kaspa (KAS). They do not require any installation. They are more hacker-friendly due to the internet storage of private keys, they are less secure than desktop or hardware wallets despite being more convenient.

Paper Wallets

Paper Wallets are a tangible document that serves as a safe, impenetrable means of long-term storage for public and private keys of Kaspa(KAS).

A string or QR code is frequently printed with the private key. Although it is secure from cyberattacks, it still needs to be guarded from physical harm and theft because misplacing the paper could mean losing money.

This is a cheap, easy solution, but security depends on how it is handled.

Guide to Creating a Kaspa Wallet

Step 1: Selecting a Proper Wallet

The first thing you need to do is to find the type of wallet that is suitable for you. Here we will be generating a desktop wallet which is considered to be highly secure.

But today in this article we are going to see how you can create a kaspa wallet using the web.

Step 2: Download the Wallet Software

We will begin by visiting the official Kaspa website (kaspa.org) to guarantee that we get the privileged and most secure wallet programming.

Kaspa Official Website and visiting kaspa wiki.

Using the website, go to the ‘Kaspa Wiki’ tab.

Kaspa Wiki Wallet Bitmala
Source: https://wiki.kaspa.org/en/wallet

In the left sidebar of the Kaspa Wiki, find and click on the “Tools” option. In the Tools section, select “Wallet” to proceed.

We’ve already discussed hardware, software, paper, and mobile wallets above in the article but today, we will focus on the setup steps for a software wallet.

Step 3: Create a New Wallet

Go to https://wallet.kaspanet.io/.

kaspanet Official website

Hit ‘Create New Wallet’, and choose the password for a new kaspa wallet.

kaspanet create new wallet choose password Bitmala

After that wallet will generate a seed phrase, allowing us to restore the wallet that we lost access to. Take this seed phrase and write it. Never tell, write or in any way reveal your seed phrase to anybody.

kaspanet seed phrase
Keep these 12 words secure, as they are essential for recovering your wallet. Keep them private; if someone learns your phrase, they could access and take all your funds.
kaspanet confirmed seed phrase

The wallet software will ask you to enter the seed phrase for confirmation. It is to make sure that the seed phrase has been backed up appropriately.

Congratulations! You have successfully created your first Kaspa wallet. You can now send and receive $KAS.

Step 4: Access to Kaspa Wallet

Since you have set up your wallet you will be able to get your Kaspa Address which you can use to receive Kaspa tokens.

Kaspa Address

The wallet interface shows the balance, transactions, history, and options to initiate token sending and receiving.

Step 5: Sending and Receiving Kaspa

Once your wallet has been created and funded, you are ready to begin the interaction.

Receiving Kaspa

Kaspa Address 1 Bitmala

To receive Kaspa, simply give your wallet address to the sender you want to transact with. Your address is found in the ‘Transactions’ tab of the wallet.

  • Example of Address: kaspa:qzqwux8gs0wra3ezqm3rhf5qh83u2hym6yusw0k0ec4fpwck5acc759fz4trj

Sending Kaspa

The first step is to click the “send” option.

image01 Bitmala

After the popup opens, enter the recipient’s information to send $KAS.

Send Kaspa from kaspanet Bitmala

Conclusion

In conclusion, make sure to set up a secure Kaspa wallet before diving into the Kaspa ecosystem

Whether you choose a desktop, mobile, or hardware wallet, always protect your seed phrase and password.

With your wallet ready, you’ll be all set to explore Kaspa’s potential.

If you liked this article, then please subscribe to our YouTube Channel for Kaspa video tutorials. You can also find us on Twitter and Instagram.

Exit mobile version