Connect with us

Hi, what are you looking for?

HEADLINES

New clipper malware steals US$400,000 in cryptocurrencies via fake Tor Browser

Distributed under the guise of Tor Browser, the malware operates by replacing a portion of the entered clipboard contents with the cybercriminal’s own wallet address once it detects a wallet address in the clipboard. It’s estimated that – so far in 2023 – cybercriminals have been able to steal approximately US$400,000 using this malware.

Kaspersky researchers have discovered an ongoing disruptive cryptocurrency theft campaign affecting more than 15,000 users across 52 countries. Distributed under the guise of Tor Browser, the malware operates by replacing a portion of the entered clipboard contents with the cybercriminal’s own wallet address once it detects a wallet address in the clipboard. It’s estimated that – so far in 2023 – cybercriminals have been able to steal approximately US$400,000 using this malware.

While this technique has been around for more than a decade and was originally used by banking trojans to replace bank account numbers, with the rise of cryptocurrency, this new type of malware is now actively targeting crypto owners and traders. 

One recent malware development involves the use of Tor Browser, a tool used to access the deeper web. The target user downloads a trojanized version of Tor Browser from a third-party resource containing a password-protected RAR archive. The purpose of the password is to prevent detection by security solutions. Once the file is dropped inside the user’s system, it registers itself in the system’s auto-start and is masqueraded with an icon of a popular application, such as uTorrent.

Kaspersky technologies have detected more than 15,000 attacks using clipboard injector malware targeting cryptocurrencies like Bitcoin, Ethereum, Litecoin, Dogecoin, and Monero. These attacks have spread to at least 52 countries worldwide, with the majority of detections in Russia due to users downloading the infected Tor Browser from third-party websites as this browser is officially blocked in the country. The top 10 affected countries also include the United States, Germany, Uzbekistan, Belarus, China, the Netherlands, the United Kingdom, and France. This means the actual number of infections may be much higher than reported.

Based on the analysis of existing samples, the estimated loss for users is at least US$400,000, but the actual amount stolen could be much greater, as this research focuses only on Tor Browser abuse. Other campaigns may use different software and malware delivery methods, as well as other types of wallets.

Advertisement. Scroll to continue reading.

“Despite the fake Tor Browser attack’s fundamental simplicity, it poses a greater danger than it seems. Not only does it create irreversible money transfers, but it is also passive and hard to detect for a regular user. Most malware requires a communication channel between the malware operator and the victim’s system. On the contrary, clipboard injectors can remain silent for years, with no network activity or other signs of presence until the day they replace a crypto wallet address,” comments Vitaly Kamluk, Head of APAC Unit, Global Research & Analysis Team.

Learn more about the new Clipper malware on Securelist.com.

To keep cryptocurrency safe, Kaspersky experts also advise users:

  • Only download software from trusted sources: Avoid downloading software from third-party websites and use official sources whenever possible. Always verify the authenticity of the software before downloading it.
  • Keep your software updated: Ensure your operating system, browser, and other software are up-to-date with the latest security patches and updates. This helps to prevent known vulnerabilities from being exploited.
  • Use security solutions: a reliable security solution will protect your devices from various types of threats.  Kaspersky Premium prevents all known and unknown cryptocurrency malware.
  • Be cautious with email links and attachments: Do not click on links or download attachments from suspicious or unknown sources, as these may contain malware.
  • Check for digital signatures: Before downloading any software, check for digital signatures to ensure that the software is authentic and has not been tampered with.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In a new report covering Q2 2024 – Q1 2025, Kaspersky has found over 250,000 cyberattacks disguised as popular anime among other shows and streaming platforms...

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

Advertisement