Get trading recommendations and read reviews on Hacked.com for just $ 39 a month.
A new CryptoShuffler Trojan has been discovered that steals the cryptocurrency of wallets by replacing the address with its own in the clipboard. from the device, reported Kaspersky Lab, who discovered the malware.
Criminals using CryptoShuffler Trojan have already stolen 23 BTCs, worth about $ 140,000, in their portfolios. According to Kaspersky Lab, the creator of the malware has been running for a year and targets Bitcoin, Ethereum, Dash, Monero, Dash and other cryptocurrencies.
The technique of "clipboard diversion" was previously observed, targeting online payment systems. Attacks on cryptocurrency are not common.
How does it work
CryptoShuffler attacks commonly used transaction processes. The Trojan monitors the clipboard of the targeted victim's device. Upon payment, the owner of the infected device copies the recipient's wallet identification number and pastes it into the destination address line of the software used to complete the transaction. The victim does not know that the Trojan is replacing his wallet address with that of the malware.
When the victim sticks the wallet identification to the destination address line, she does not send the money to the intended destination but to that of the fraudster. The process takes milliseconds.
Cryptocurrency users do not normally check their multi-digit numbers when they make payments.
Also read: The bitcoin payment processor BitPay warns against the Trojan virus
Sergey Yunakovsky, malware analyst at Kaspersky Lab, said that people considering investing in cryptocurrency should carefully protect their investments.
Kaspersky Lab also advises cryptocurrency users to be very attentive and check the portfolio number shown in the destination address line when they make payments. They should also be aware of the difference between an invalid address and an incorrect address. An invalid address will be detected and the transaction will not be completed. An incorrect one will be completed and the user will lose his money.
Users can also protect themselves by using a security feature that analyzes vulnerabilities known to be exploited by fraudsters.
Image from Shutterstock.