Google Threat Intelligence Flags Ghostblade iOS Crypto-Stealing Malware
Google Threat Intelligence says it found “Ghostblade,” a JavaScript-based crypto-stealing malware targeting iOS users. Reported in March 2025, Ghostblade can run via iOS web browsing, using social engineering and obfuscation to bypass app-store style checks.
After infection, Ghostblade seeks device permissions, then harvests high-value targets: wallet seed phrases/private keys, exchange authentication cookies, SMS or authenticator-based 2FA codes, and browser data such as saved passwords and browsing history. It communicates with command-and-control servers using encrypted channels, with possible time-delayed exfiltration and remote updates to extend control.
Google and CrowdStrike observed real-world infection patterns. Likely entry vectors include compromised ad networks, phishing pages impersonating crypto services, and malicious search-result redirects. The threat also expands beyond crypto theft by collecting SIM-related data, identity documents, contacts, and location history—enabling SIM swapping and follow-on phishing and identity fraud.
For traders, this Ghostblade update is primarily a custody and account-risk event rather than a fundamental market driver. It raises the chance of credential theft and exchange account fraud headlines, which can hurt sentiment in the short term.
Separately, a Nominis report noted crypto losses fell to $49 million in February from $385 million in January, suggesting attackers may be shifting toward phishing and wallet-poisoning tactics that exploit human error rather than purely code-based exploits.
Neutral
Ghostblade 的核心影响在于提升用户账户与托管环节的被盗风险:它会直接抓取种子短语/私钥、交易所认证 Cookie、2FA 代码以及浏览器凭证,并通过 SIM 相关数据支撑换卡与后续诈骗。这类事件更可能通过“安全/风控新闻”影响短期交易情绪,而不直接改变任何特定加密资产的供需或链上基本面。
短期层面:如果出现更密集的凭证泄露与交易所账号欺诈报道,可能带来避险情绪、提高用户交易摩擦(如提现延迟/冻结、客服与申诉压力),从而对市场情绪产生轻微扰动。
中长期层面:虽然二月损失下降(从 1 月的 3.85 亿美元降至 2 月 4900 万美元)可能反映部分攻击方式的变化,但并不意味着威胁消退;从代码型利用向钓鱼与钱包投毒等“人因”攻击迁移,往往会让安全事件更持续出现。
因此,对“价格本身”的直接推动有限,整体更偏向风险管理层面的中性影响。