Author

Topic: Clipboard Hijacker + Tips to protect (Read 114 times)

hero member
Activity: 3010
Merit: 794
July 02, 2018, 05:26:24 PM
#2
Clipboard hijackers do exist for a long time which you had mentioned when it was still rampant and now they do utilize
and make use this method on crypto where its is commonly used due to copy pasting where address before making any transfers.
We have seen on previous years where this hacking incident do victimized hundreds or thousands and the hackers do accumulate
millions of dollars on a short span of time. Clean PC and updated antivirus would be the best things for these to be avoided even on phishing
emails and links we should still be careful yet lots of ways on how to hack others funds.
jr. member
Activity: 78
Merit: 9
July 02, 2018, 11:28:32 AM
#1
Hello everybody,

because I have just read it, I thought that a thread on the subject would not be a wrong idea.

A fairly new piece of malicious software called Clipboard Hijacker is targeting Clipboard manipulation on Windows computers. As soon as the user saves a Bitcoin address known to the system to the clipboard, the address is changed automatically. The cryptocurrency then lands in the wallet of cybercriminals instead of on the desired account. This new variant is part of the recently released "All-Radio 4.27 Portable" malicious software package. It automatically monitors about 2.3 million bitcoin addresses.

The Bleeping Computer team has identified a particularly sophisticated malware for Windows computers. The Clipboard Hijacker stores 2.3 million Bitcoin addresses, which are worth money to cybercriminals. Many online marketers paste Wallet's destination address via copy and paste. But as soon as one of the known 2.3 million addresses appears in the clipboard, the Trojan changes the clipboard. Instead of the desired wallet address is automatically entered the cybercriminals. The number of wallets saved is record-breaking. Previously known Clipboard hijackers had only 400,000 to 600,000 addresses of various crypto currencies (mostly Bitcoin) in the portfolio.

The malware installs quickly, silently and easily. After downloading the d3dx11_31.dll file, the virus creates an executable file named "DirectX 11" that will not be noticed by outsiders due to the name. This file becomes active as soon as the user logs on to Windows. Later, two more files are deposited on the target computer. Nothing happens after that. The malware should not interfere with normal operation and is otherwise not noticeable. The infected computer waits for the moment to insert a wallet address into the clipboard. This is then changed if necessary. The problem: If the user does not carefully check Wallet's destination address, they will not detect the fraud. If you send the coins, they end up on the account of cybercriminals and are thus lost forever.

How can I protect myself from the Clipboard Hijacker?

If you want to protect yourself from manipulating your Bitcoin transfers, you should bring your anti-virus software up to date. The antivirus software should then completely check the PC. In addition, it always makes sense to reconcile the destination address with transfers manually multiple times with the original. Even with novel malicious programs can thus be avoided despite an infection of your own computer that funds are redirected to the accounts of third parties. Clipboard hijackers were reported more than a decade ago when Mac OS X users were affected by the infection. New is the change to the clipboard to redirect crypto currencies. The former malware has immediately made itself felt, because the clipboard was no longer useful. Particularly insidious is the new variant, because it makes itself felt only when it is too late and at the same time has an extensive database of Bitcoin addresses.
Jump to: