💎 Fed’s first rate cut since 2020 set to trigger market. Find undervalued gems with Fair ValueSee Undervalued Stocks

One Clipboard Hijacking Malware Monitors 2.3 Million BTC Wallets

Published 07/03/2018, 11:00 AM
Updated 07/03/2018, 11:21 AM
 One Clipboard Hijacking Malware Monitors 2.3 Million BTC Wallets
BTC/USD
-

A new strain of clipboard-hijacking malware has an impressive list of 2.3 million destination Bitcoin addresses for which it monitors. This covers about 10% of the wallets currently in existence.

To explain why this is important, we must first look at how cryptojacking works on this level. A clipboard hijacker typically just takes a snapshot of the victim’s clipboard as soon as it copies something.

Once that information is there, the hijacker has two choices: It could either algorithmically determine whether the user copied a Bitcoin address, as is the case with ClipboardWalletHijacker; or it could simply have a precompiled list of existing Bitcoin addresses that it scans through.

Once either method detects a Bitcoin address, it replaces the data in the clipboard with the hacker’s wallet address. Such malware counts on the oft-encountered absentmindedness of newbie cryptocurrency holders.

Although other clipboard-based malware has been spotted using the list-based method, none so far have even come close to having a list as large as this one.

A skillful hacker would compile only a list of some of the most frequented and largest addresses to scan. However, judging by the addresses we’ve seen, this particular hacker did not make this effort and simply chose to scan inefficiently through a database that may or may not contain a wallet that regularly receives large amounts of BTC.

More impressive than the number of addresses in the list is the way in which the malware behaves to infect a computer.

“When installed, a DLL named d3dx11_31.dll will be downloaded to the Windows Temp folder and an autorun called ‘DirectX 11’ will be created to run the DLL when a user logs into the computer,” Bleeping Computer wrote.

Afterward, the malware depends on rundll32.exe—a Windows system executable—to automatically start it when the computer boots.

Although removing the malware is quite easy, it’s much more difficult to detect in the first place when compared to other strains we’ve seen so far. In the near future, we can expect antivirus software to catch it rather quickly since its signature is pretty easy to find using heuristics.

After all, the hacker made a piece of malware that leaves behind a gargantuan Bitcoin wallet address database. That’s pretty hard for antivirus software not to notice.


This article appeared first on Cryptovest

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.