• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Clipboard-Injector Attacks Target Cryptocurrency Users

You are here: Home / General Cyber Security News / Clipboard-Injector Attacks Target Cryptocurrency Users
March 28, 2023

A malware marketing campaign concentrating on cryptocurrency wallets has been not long ago found out by security researchers at Kaspersky.

Speaking about the findings in an advisory released today, the company mentioned the attacks were being 1st noticed in September 2022 and relied on malware replacing element of the clipboard contents with cryptocurrency wallet addresses.

“Despite the attack currently being fundamentally uncomplicated, it harbors additional danger than [it] would appear to be. And not only since it produces irreversible revenue transfers, but since it is so passive and tough to detect for a typical user,” reads the advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Kaspersky included that this is particularly genuine when thinking about that though worms and viruses may possibly not essentially connect to the attacker’s manage servers, they typically deliver obvious network action or increase CPU or RAM utilization.

“So does encrypting ransomware. Clipboard injectors, on the contrary, can be silent for a long time, exhibit no network action or any other indicators of presence right until the disastrous day when they switch a crypto wallet tackle,” the firm discussed.

Read through far more on clipboard malware below: Scientists Release MortalKombat Ransomware Decryptor

Kaspersky included that the malware campaign relying on this approach was observed abusing Tor Browser installers.

“We relate this to the ban of Tor Project’s web-site in Russia at the conclusion of 2021, which was claimed by the Tor Venture alone […] Malware authors read the phone and responded by making trojanized Tor Browser bundles and distributing them among the Russian-speaking buyers.”

As for the payload noticed throughout the destructive campaign, Kaspersky stated it was a passive and communication-significantly less clipboard-injector malware.

“The malware integrates into the chain of Windows clipboard viewers and gets a notification just about every time the clipboard info is altered,” reads the advisory. “If the clipboard is made up of text, it scans the contents with a established of embedded standard expressions. Ought to it find a match, it is changed with just one randomly selected handle from a hardcoded listing.”

The clipboard-injector mainly qualified techniques in Russia and Eastern Europe, but also in the US, Germany and China, among many others.

To mitigate the impression of this danger, Kaspersky encouraged program defenders to down load computer software from only reputable and trustworthy resources.

“A blunder probable created by all victims of this malware was to download and run Tor Browser from a third-party useful resource,” the firm described. “The installers coming from the official Tor Challenge were being digitally signed and did not have any signals of these malware.”

Destructive Tor Browser installers have been also spread last 12 months by way of an explanatory movie about the Darknet on YouTube.


Some pieces of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Apple Releases Security Patches For Older iPhone and iPad Models
Next Post: Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders microsoft introduces gpt 4 ai powered security copilot tool to empower defenders»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.