macOS Users at Risk: Malware Mimics Ledger Live to Access Crypto
Security researchers have uncovered a sophisticated malware campaign targeting macOS users, with attackers distributing a malicious clone of Ledger Live—the official application for managing Ledger hardware wallets. The fake application, nearly indistinguishable from the genuine version, prompts users to enter their 24-word recovery phrase under the guise of security verification or wallet synchronization.
This social engineering exploit capitalizes on the trust users place in Ledger Live, a critical tool for securing cryptocurrency assets. Once victims input their seed phrases, the data is transmitted to attacker-controlled servers, granting cybercriminals full access to associated wallets. Researchers from Unit 42, Intego, and Moonloc warn that the malware’s design suggests a targeted effort to drain high-value crypto holdings.
The incident underscores persistent vulnerabilities in digital asset security, particularly around wallet management interfaces. Unlike exchange hacks or smart contract exploits, this attack vector directly manipulates user behavior—a reminder that even the most secure hardware solutions can be compromised through psychological manipulation.