Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    New Clipper Malware Targeting Portuguese Cryptocurrency Users

    justmattgBy justmattgApril 5, 2023No Comments2 Mins Read

    [ad_1]

    Apr 05, 2023Ravie LakshmananCyber Threat / Malware

    Clipper Malware

    Portuguese users are being targeted by a new malware codenamed CryptoClippy that’s capable of stealing cryptocurrency as part of a malvertising campaign.

    The activity leverages SEO poisoning techniques to entice users searching for “WhatsApp web” to rogue domains hosting the malware, Palo Alto Networks Unit 42 said in a new report published today.

    CryptoClippy, a C-based executable, is a type of cryware known as clipper malware that monitors a victim’s clipboard for content matching cryptocurrency addresses and substituting them with a wallet address under the threat actor’s control.

    “The clipper malware uses regular expressions (regexes) to identify what type of cryptocurrency the address pertains to,” Unit 42 researchers said.

    “It then replaces the clipboard entry with a visually similar but adversary-controlled wallet address for the appropriate cryptocurrency. Later, when the victim pastes the address from the clipboard to conduct a transaction, they actually are sending cryptocurrency directly to the threat actor.”

    Clipper Malware

    The illicit scheme is estimated to have netted its operators about $983 so far, with victims found across manufacturing, IT services, and real estate industries.

    It’s worth noting that the use of poisoned search results to deliver malware has been adopted by threat actors associated with the GootLoader malware.

    UPCOMING WEBINAR

    Learn to Secure the Identity Perimeter – Proven Strategies

    Improve your business security with our upcoming expert-led cybersecurity webinar: Explore Identity Perimeter strategies!

    Don’t Miss Out – Save Your Seat!

    Another approach used to determine suitable targets is a traffic direction system (TDS), which checks if the preferred browser language is Portuguese, and if so, takes the user to a rogue landing page.

    Users who do not meet the requisite criteria are redirected to the legitimate WhatsApp Web domain without any further malicious activity, thereby avoiding detection.

    The findings arrive days after SecurityScorecard detailed an information stealer called Lumma that’s capable of harvesting data from web browsers, cryptocurrency wallets, and a variety of apps such as AnyDesk, FileZilla, KeePass, Steam, and Telegram.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous Articlei-PRO reports business, product strides in first year as independent AI camera provider
    Next Article Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑