Cybercriminals are launching sophisticated campaigns targeting Mac users with fake Ledger applications aimed at stealing cryptocurrency. These fake apps create a sense of urgency prompting users to enter their seed phrases, allowing criminals to access all funds in the user’s wallet. This attack, studied since August 2024 by Moonlock Lab, bypasses the protection offered by hardware wallets, exploiting a user’s psychology rather than the hardware’s technical vulnerabilities.

Thousands of Asus routers are being hit with stealthy, persistent backdoors
Security company GreyNoise detected a campaign in mid-March where as many as 9,500 Asus routers were compromised by a threat actor named ViciousTrap. The attackers