Executive Summary

A recent report by GK8, a crypto custody expert owned by Mike Novogratz’s crypto investment platform Galaxy Digital, indicates that private key theft is no longer just another method hackers use to attack crypto users. Instead, it has evolved into a full-fledged business operation.

The report highlights the evolution of private key theft into an industrialized process, emphasizing the emergence of black market tools that enable criminals to locate and steal a user's seed phrase.

Sophisticated Theft Tools

These tools include malware infostealers and seed phrase finders, which can scan files, documents, cloud backups, and chat histories to quickly extract a user's private key, effectively giving attackers complete control over their assets.

The report recommends using secure custody solutions, implementing multi-step approval processes, and enforcing role separation to mitigate the risks posed by this commercialized and constantly evolving threat.

The Mechanics of Theft

The process typically begins with hackers using malware to steal large amounts of data from an infected device. The stolen data is then fed into automated tools that rebuild seed phrases and private keys. After identifying wallets containing valuable assets, attackers assess the security measures in place to drain the funds.

These applications, which perform mnemonic parsing and transform raw logs into keys, are sold for hundreds of dollars on darknet forums.

Protection Measures

To protect themselves from the rise in private key hacks, users should assume all local device data could be compromised, never store seed phrases in digital form, use multi-party approval for transactions, and rely on secure custody systems.

The report also recommends a healthy combination of hot, cold, and impenetrable vault storage to minimize the asset value exposed to an immediate drain.

Beware Social Engineering

Kela warns that malware infostealers often rely on social engineering, using fake installers, poisoned ads, or phishing campaigns to trick users.

To stay safe, users should be extremely careful with attachments and links, avoid software from untrusted sources, and resist scams that exploit macOS’s reputation for security.

The firm also emphasizes the importance of using strong, unique passwords for financial apps, enabling multi-factor authentication, and keeping macOS and all applications up to date to prevent malware from stealing sensitive information.


Risk Warning: this article represents only the author’s views and is for reference only. It does not constitute investment advice or financial guidance, nor does it represent the stance of the Markets.com platform.When considering shares, indices, forex (foreign exchange) and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and could result in capital loss.Past performance is not indicative of any future results. This information is provided for informative purposes only and should not be construed to be investment advice. Trading cryptocurrency CFDs and spread bets is restricted for all UK retail clients. 

Latest news

Saturday, 6 December 2025

Indices

ESMA Expansion Sparks Crypto, Fintech Slowdown Concerns in EU

Saturday, 6 December 2025

Indices

Bitcoin's 'Santa' Rally: Fed Rate Decision and 2026 Outlook

Saturday, 6 December 2025

Indices

Western Union Unveils Stable Card, Stablecoin Strategy to Combat Inflation