Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Altura Enables On-chain Lending With AVLT on Morpho

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Clipboard-Injector Attacks Target Cryptocurrency Users
Clipboard-Injector Attacks Target Cryptocurrency Users
Security

Clipboard-Injector Attacks Target Cryptocurrency Users

October 5, 2023No Comments3 Mins Read

A malware campaign targeting cryptocurrency wallets has been recently discovered by security researchers at Kaspersky.

Discussing the findings in an advisory published today, the company said the attacks were first observed in September 2022 and relied on malware replacing part of the clipboard contents with cryptocurrency wallet addresses.

“Despite the attack being fundamentally simple, it harbors more danger than [it] would seem. And not only because it creates irreversible money transfers, but because it is so passive and hard to detect for a normal user,” reads the advisory.

Kaspersky added that this is particularly true when considering that while worms and viruses may not necessarily connect to the attacker’s control servers, they often generate visible network activity or increase CPU or RAM usage.

“So does encrypting ransomware. Clipboard injectors, on the contrary, can be silent for years, show no network activity or any other signs of presence until the disastrous day when they replace a crypto wallet address,” the company explained.

Read more on clipboard malware here: Researchers Release MortalKombat Ransomware Decryptor

Kaspersky added that the malware campaign relying on this technique was observed abusing Tor Browser installers.

“We relate this to the ban of Tor Project’s website in Russia at the end of 2021, which was reported by the Tor Project itself […] Malware authors heard the call and responded by creating trojanized Tor Browser bundles and distributing them among Russian-speaking users.”

As for the payload observed during the malicious campaign, Kaspersky explained it was a passive and communication-less clipboard-injector malware.

“The malware integrates into the chain of Windows clipboard viewers and receives a notification every time the clipboard data is changed,” reads the advisory. “If the clipboard contains text, it scans the contents with a set of embedded regular expressions. Should it find a match, it is replaced with one randomly chosen address from a hardcoded list.”

See also  China executes 11 ringleaders of pig butchering scam compound

The clipboard-injector mainly targeted systems in Russia and Eastern Europe, but also in the US, Germany and China, among others.

To mitigate the impact of this threat, Kaspersky advised system defenders to download software from only reliable and trusted sources.

“A mistake likely made by all victims of this malware was to download and run Tor Browser from a third-party resource,” the company explained. “The installers coming from the official Tor Project were digitally signed and didn’t contain any signs of such malware.”

Malicious Tor Browser installers were also spread last year via an explanatory video about the Darknet on YouTube.

Source link

attacks ClipboardInjector cryptocurrency Target users

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Bitcoin Is About To Steal One of Ethereum’s Most Valuable Features

September 27, 2023

Experts Unveil Top Strategies for Crypto Community Building

October 15, 2023

Unlocking the Potential of Cryptocurrency Cloud Mining with TopHash

September 28, 2023

Type above and press Enter to search. Press Esc to cancel.