Connect with us

Technology

New Clipper Malware Steals USD400,000 in Cryptocurrencies via Fake Tor Browser

Published

on

Kaspersky, a cybersecurity company, has discovered a cryptocurrency theft campaign that has affected over 15,000 users across 52 countries. This malware replaces a portion of the clipboard contents with the cybercriminal’s own wallet address once it detects a wallet address in the clipboard. This has enabled the cybercriminals to steal approximately US$400,000 so far in 2023. The malware uses the Tor Browser as a disguise, a tool used to access the deeper web. Once the malware is dropped inside the user’s system, it is masqueraded with an icon of a popular application, such as uTorrent, and registers itself in the system’s auto-start.

While this technique has been around for more than a decade and was originally used by banking trojans to replace bank account numbers, this new type of malware is now actively targeting crypto owners and traders. Kaspersky technologies have detected more than 15,000 attacks using clipboard injector malware targeting cryptocurrencies like Bitcoin, Ethereum, Litecoin, Dogecoin, and Monero.

The attacks have spread to at least 52 countries worldwide, with the majority of detections in Russia due to users downloading the infected Tor Browser from third-party websites as this browser is officially blocked in the country. The actual number of infections may be much higher than reported. The estimated loss for users is at least US$400,000, but the actual amount stolen could be much greater, as other campaigns may use different software and malware delivery methods, as well as other types of wallets.

Vitaly Kamluk, Head of APAC Unit, Global Research & Analysis Team, warns that despite the fake Tor Browser attack’s fundamental simplicity, it poses a greater danger than it seems. Not only does it create irreversible money transfers, but it is also passive and hard to detect for a regular user.

To keep cryptocurrency safe, Kaspersky experts advise users:

  • Only download software from trusted sources: Avoid downloading software from third-party websites and use official sources whenever possible. Always verify the authenticity of the software before downloading it.
  • Keep your software updated: Ensure your operating system, browser, and other software are up-to-date with the latest security patches and updates. This helps to prevent known vulnerabilities from being exploited.
  • Use security solutions: a reliable security solution will protect your devices from various types of threats. Kaspersky Premium prevents all known and unknown cryptocurrency malware.
  • Be cautious with email links and attachments: Do not click on links or download attachments from suspicious or unknown sources, as these may contain malware.
  • Check for digital signatures: Before downloading any software, check for digital signatures to ensure that the software is authentic and has not been tampered with.
Continue Reading
Advertisement
Comments

Subscribe

Advertisement

Facebook

Advertisement

Ads Blocker Image Powered by Code Help Pro

It looks like you are using an adblocker

Please consider allowing ads on our site. We rely on these ads to help us grow and continue sharing our content.

OK
Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock