Connect with us
DAPA Banner

Crypto World

Google Threat Intel Flags Ghostblade as Crypto-Stealing Malware

Published

on

Crypto Breaking News

Google Threat Intelligence has flagged a new crypto-stealing malware named “Ghostblade” targeting Apple iOS devices. Described as part of the DarkSword family of browser-based tools, Ghostblade is engineered to siphon private keys and other sensitive data in a rapid, discreet burst rather than a continuous, always-on presence on the device.

Written in JavaScript, Ghostblade activates, harvests data from the compromised device, and relays it to malicious servers before shutting down. Researchers note that the malware’s design makes it harder to detect, as it does not require additional plugins and ceases operation once data extraction completes. Google’s threat intelligence team highlights that Ghostblade also takes steps to avoid detection by deleting crash reports that would otherwise alert Apple’s telemetry systems.

Beyond private keys, the malware is capable of accessing and transmitting messaging data from iMessage, Telegram, and WhatsApp. It can also harvest SIM card information, user identity details, multimedia files, geolocation data, and access various system settings. The broader DarkSword framework, which Ghostblade belongs to, is cited by Google as part of an evolving set of threats illustrating how attackers continually refine their toolkit to target crypto users.

For readers who track threat trends, Ghostblade sits alongside other components of the DarkSword iOS exploit chain described by Google Threat Intelligence. The set of tools is observed within a wider context of crypto-threat evolution, including reports on iOS-based exploit kits used in crypto phishing campaigns.

Advertisement

Key takeaways

  • Ghostblade represents a JavaScript-based crypto-stealing threat on iOS, delivered as part of the DarkSword ecosystem and designed for fast data exfiltration.
  • The malware operates briefly and non-continuously, reducing the likelihood of long-term device footholds and complicating detection.
  • It can relay sensitive data from iMessage, Telegram, and WhatsApp, and can access SIM information, identity data, multimedia, geolocation, and system settings, while also erasing crash reports to evade discovery.
  • The development aligns with a broader shift in the threat landscape toward social-engineering and data-extraction tactics that exploit human behavior, not just software vulnerabilities.
  • February’s crypto-hacking losses dropped sharply to $49 million from $385 million in January, signaling a pivot from code-based intrusions to phishing and wallet-poisoning techniques, according to Nominis.

Ghostblade and the DarkSword ecosystem: what’s known

Google’s researchers describe Ghostblade as a component of the DarkSword family—a suite of browser-based malware tools that target crypto users by stealing private keys and related data. Ghostblade’s JavaScript core allows rapid interaction with the device while remaining lightweight and transient. This design choice is consistent with other recent on-device threats that favor quick data exfiltration cycles over prolonged infections.

In practice, the malware’s capabilities extend beyond mere key theft. By accessing messaging apps such as iMessage, Telegram, and WhatsApp, attackers can intercept conversations, credentials, and potentially sensitive attachments. The inclusion of SIM card information and geolocation access broadens the potential attack surface, enabling more comprehensive identity theft and fraud scenarios. Crucially, the malware’s ability to wipe crash reporting further obscures activity, complicating post-infection forensics for both victims and defenders.

As part of the broader DarkSword discourse, Ghostblade underscores the ongoing arms race in on-device threat intelligence. Google Threat Intelligence has framed DarkSword as one of the latest examples illustrating how malicious actors continue to refine iOS-focused attack chains, exploiting the strong trust users place in their devices and the apps they rely on for daily communication and finance.

From code-centric intrusions to human-factor exploits

The February 2026 crypto-hacking landscape reflects a marked shift in attacker behavior. According to Nominis, total losses from crypto hacks fell to $49 million in February, a steep drop from $385 million in January. The firm attributes the decline to a pivot away from purely code-based threats toward schemes that leverage human error, including phishing attempts, wallet poisoning attacks, and other social-engineering vectors that lead users to unwittingly reveal keys or credentials.

Phishing remains a central tactic. Attackers deploy fake websites designed to resemble legitimate platforms, often with URLs that mimic real sites to lure users into entering private keys, seed phrases, or wallet passwords. When users interact with these lookalike interfaces—whether by logging in, approving transactions, or pasting sensitive data—the attackers gain direct access to funds and credentials. This shift toward human-targeted exploits has implications for how exchanges, wallets, and users must defend themselves, emphasizing user education alongside technical safeguards.

Advertisement

The February data point aligns with a broader industry narrative: while code-level exploits and zero-days continue to mature, a growing share of the risk to crypto holdings comes from social-engineering exploits that exploit well-established human behaviors—trust, urgency, and the habitual use of familiar interfaces. For industry observers, the takeaway is not only about patching software vulnerabilities but also about hardening the human element of security through education, more robust authentication, and safer onboarding experiences for wallet users.

Implications for users, wallets, and builders

Ghostblade’s emergence—and the accompanying trend toward human-centered attacks—highlights several practical takeaways for users and developers alike. First, device hygiene remains critical. Keeping iOS up to date, applying app and browser hardening measures, and employing hardware wallets or secure enclaves for private keys can raise the bar against rapid exfiltration attacks.

Second, users should exercise heightened caution with messaging apps and web surfaces. The convergence of on-device data access with phishing-style deception means that even seemingly benign interactions—opening a link, approving a permission, or pasting a seed phrase—can become a gateway for theft. Multi-factor authentication, authentication apps, and biometric protections can help reduce risk, but education and skepticism about unexpected prompts are equally vital.

For builders, the Ghostblade case emphasizes the importance of anti-phishing controls, secure key management flows, and transparent user warnings around sensitive operations. It also reinforces the value of continuous threat intelligence sharing—especially around on-device threats that blend browser-based tools with mobile operating system features. Cross-industry collaboration remains essential to detect novel exploitation chains before they become widely effective.

Advertisement

What to watch next

As Google Threat Intelligence and other researchers continue to track DarkSword-linked activity, observers should monitor updates on iOS exploit chains and the emergence of similarly stealthy, short-duration malware. The February shift toward human-factor vulnerabilities suggests a future where defenders must bolster both technical safeguards and user-facing education to reduce exposure to phishing and wallet-poisoning schemes. For readers, the next milestones include any formal threat intel advisories on iOS crypto threats, new detections from security vendors, and how major platforms adapt their anti-phishing and fraud-prevention measures in response to these evolving playbooks.

In the meantime, keeping a watchful eye on threat intelligence backstops—such as Google Threat Intelligence’s reporting on DarkSword and related iOS exploits, along with ongoing analyses from Nominis and other blockchain security researchers—will be essential for assessing risk and refining defenses against crypto-focused cybercrime.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Grayscale Files S-1 for Hyperliquid ETF, Expanding Crypto ETF Field

Published

on

Crypto Breaking News

Grayscale has moved to bring a spot Hyperliquid exchange-traded fund to market, filing for a product that would track the Hyperliquid (HYPE) token and potentially trade on Nasdaq under the ticker GHYP if approved. The filing positions Grayscale alongside Bitwise and 21Shares in pursuing a dedicated on-exchange vehicle tied to Hyperliquid’s perpetual futures protocol and associated assets.

The company’s S-1 registration with the U.S. Securities and Exchange Commission confirms Coinbase as the custodian for the proposed ETF, though it does not disclose a management fee for GHYP. Notably, Grayscale indicates in the filing that staking rewards could be added to the ETF in the future, provided certain conditions are met.

Key takeaways

  • Grayscale filed an S-1 with the SEC for a spot Hyperliquid ETF (GHYP) that would trade on Nasdaq if approved, marking a continued push by traditional asset managers into tokenized, 24/7-trading instruments.
  • Coinbase is named as the custodian, but no management fee for the proposed ETF is disclosed in the filing.
  • The filing leaves open the possibility of incorporating staking rewards into GHYP later, subject to regulatory and other conditions.
  • Hyperliquid remains a dominant force in perpetual futures trading, with weekly volumes typically ranging from $40 billion to $100 billion, according to DeFiLlama data, while total weekly perps volume hovers between $125 billion and $300 billion this year.

Grayscale’s Hyperliquid bet and what it signals for investors

The S-1 filing outlines a strategy for offering a spot ETF that would provide direct exposure to the Hyperliquid ecosystem through the HYPE token. If cleared by regulators, GHYP would give investors a traditional market access path to a crypto-native instrument designed to track the price movements of Hyperliquid’s tokenized futures protocol. Grayscale’s choice of Nasdaq as a potential listing venue reflects a broader trend of bridging traditional exchanges with crypto-native assets, aiming to attract institutional participants seeking regulated, familiar trading rails.

Crucially, the document confirms Coinbase as the ETF’s custodian, anchoring the product to a widely used on-ramp and custody provider in the crypto ecosystem. However, the filing does not reveal a management fee, leaving a key detail for future disclosure and regulatory review.

Beyond current exposure, Grayscale notes a potential expansion: staking rewards could be integrated into GHYP at a later date if certain conditions are satisfied. That possibility would offer an additional yield channel for investors, on top of potential price appreciation of the HYPE token. The idea of staking-enabled ETFs has floated around in contemporaneous filings by peers, signaling growing appetite for yield-bearing crypto products among institutional issuers.

Advertisement

Hyperliquid’s enduring role in the perpetuals market

Hyperliquid has established itself as a central venue for perpetual futures trading, a niche that blends crypto assets with continuous, derivatives-like exposure. Even as weekly trading volume for the platform cooled from its August peak, DeFi analytics show Hyperliquid handling between roughly $40 billion and $100 billion in weekly volume, keeping it at the top among perps platforms. DeFiLlama’s data corroborates Hyperliquid’s dominant position in the space, even as newer entrants emerged in 2025—Aster, Lighter, and edgeX—each carving out their own slices of the market but typically handling far less weekly volume than Hyperliquid.

Industry observers note that the broader perps market continues to move in sizable increments. Total weekly perps trading volume for the sector has hovered roughly between $125 billion and $300 billion this year, still well above levels from a year ago and signaling sustained demand for tokenized leverage and cross-asset exposure, particularly in a 24/7 trading environment that Hyperliquid helps to showcase.

Grayscale’s filing arrives amid a wave of interest in Hyperliquid-linked products from other asset managers. Bitwise filed for its own Hyperliquid spot ETF last year and amended the prospectus in December to include staking, while 21Shares signaled in its October filing that staking could be incorporated at a later date. These filings collectively illustrate a broader push to bring synthetic, crypto-native trading paradigms into regulated, exchange-traded formats that would be palatable to traditional financial audiences.

What to watch next

Regulatory review will determine whether GHYP can proceed to a Nasdaq listing. Investors should monitor not only the SEC’s assessment of the product’s structure and disclosures but also how Grayscale and other issuers address staking provisions, which could add yield opportunities while introducing new considerations around risk, custody, and volatility. As Hyperliquid and its competitors evolve, readers should track whether staking becomes a standard feature across spot Hyperliquid ETFs and how market liquidity and regulatory expectations shape those trajectories.

Advertisement

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading

Crypto World

Grayscale Files For Spot Hyperliquid ETF

Published

on

Grayscale Files For Spot Hyperliquid ETF

Unlike Bitwise, Grayscale doesn’t plan to incorporate staking for its Hyperliquid ETF but hasn’t ruled out integrating it in the future.

Crypto asset manager Grayscale has filed for a spot Hyperliquid exchange-traded fund, joining Bitwise and 21Shares in seeking to offer a product tied to the Hyperliquid perpetual futures protocol and blockchain.

The Grayscale HYPE ETF would track the price movement of the Hyperliquid (HYPE) token and trade under the ticker GHYP on the Nasdaq if approved, according to Grayscale’s S-1 registration statement filed with the Securities and Exchange Commission on Friday.

Advertisement

Grayscale listed Coinbase as the custodian but didn’t disclose a management fee for the proposed Hyperliquid product.

Grayscale’s S-1 filing for a Hyperliquid ETF. Source: SEC

Grayscale’s filing comes as Hyperliquid continues to be integrated by crypto platforms and be increasingly relied on by TradFi when traditional markets are closed, as it offers 24/7 trading for tokenized real-world assets like oil and gold.

Grayscale said it may consider incorporating staking rewards into its Hyperliquid ETF at a later date, provided certain conditions are met. 

Related: Morgan Stanley files amended S-1 for MSBT Bitcoin ETF

Staking would enable GHYP investors to earn yield on top of potential price appreciation from the HYPE token.

Advertisement

Bitwise filed for its Hyperliquid ETF in September and amended it in December to include staking, while 21Shares also contemplated incorporating staking at a later date in its October filing.

Hyperliquid continues to dominate perps trading

While trading volume on Hyperliquid has cooled off from its August highs, it continues to see between $40 billion and $100 billion in weekly volume — maintaining its position as the most traded perps futures platform, DeFiLlama data shows.