#1 Trending Cybersecurity News & Magazine
Wednesday, September 27, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Ferguson Wellman cyber attack

    50 Targets and Counting: LostTrust Claims Ferguson Wellman Cyber Attack

    Iran Telecom Cyber Attack

    Iran Telecom Cyber Attack: APT IRAN Claims Access to 4TB of Data

    BORN Data Breach

    Ontario Grapples with Unprecedented Data Breach Impacting Newborn Care Registries

    Sony Data Leak

    “Major Nelson” Claims Sony Data Leak Alleging RansomedVC Lied

    Waterloo Media Data Breach

    Waterloo Media Faces Data Breach by NoEscape Ransomware Group

    Conduent Data Breach

    Conduent Data Breach: Threat Actor Frustrated With Organizational Negligence

    Cyber Attack on Lockheed Martin

    Cyber Attack on Lockheed Martin: Killnet Targets US Defense Giant Amid Geopolitical Tensions

    ALPHV Ransomware group

    ALPHV Ransomware Group’s Three New Victims: Clarion, Phil Data, MNGI

    Mandy Andress

    Mandy Andress on Conquering Complexity, Open Source, and Compliance Challenges in Cybersecurity

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Ferguson Wellman cyber attack

    50 Targets and Counting: LostTrust Claims Ferguson Wellman Cyber Attack

    Iran Telecom Cyber Attack

    Iran Telecom Cyber Attack: APT IRAN Claims Access to 4TB of Data

    BORN Data Breach

    Ontario Grapples with Unprecedented Data Breach Impacting Newborn Care Registries

    Sony Data Leak

    “Major Nelson” Claims Sony Data Leak Alleging RansomedVC Lied

    Waterloo Media Data Breach

    Waterloo Media Faces Data Breach by NoEscape Ransomware Group

    Conduent Data Breach

    Conduent Data Breach: Threat Actor Frustrated With Organizational Negligence

    Cyber Attack on Lockheed Martin

    Cyber Attack on Lockheed Martin: Killnet Targets US Defense Giant Amid Geopolitical Tensions

    ALPHV Ransomware group

    ALPHV Ransomware Group’s Three New Victims: Clarion, Phil Data, MNGI

    Mandy Andress

    Mandy Andress on Conquering Complexity, Open Source, and Compliance Challenges in Cybersecurity

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

New Clipper Malware Variant Targets Cryptocurrency Transactions, Replaces Victim’s Wallet Address

The new Clipper malware has emerged as a potent threat to cryptocurrency transactions as it can manipulates the victim's wallet address.

Vishwa Pandagle by Vishwa Pandagle
July 4, 2023
in Firewall Daily, Malware News
0
Clipper Malware Variant
603
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

New Clipper malware variants have emerged, specifically designed to target individuals engaged in cryptocurrency transactions.

During these transactions, it was noted that these variants were successfully replacing users’ credentials with the wallet address of scammers, allowing them to illicitly abscond with the funds being transferred.

You might also like

Zero-Day Exploitation Impact: MOVEit Breach Statistics Reach 2,120 Organization

MEDUSA Ransomware Group Strikes Again: Italian Company and Canadian Firm Latest Victims

50 Targets and Counting: LostTrust Claims Ferguson Wellman Cyber Attack

The clipper malware variants use the clipboard to copy the data pasted on it. Users are urged not to leave copied crypto wallet credentials including the wallet address on the clipboard.

Details about the Clipper malware variants

Cyble Research and Intelligence Labs (CRIL) found several Clipper malware variants advertised on the Telegram channel of cyber criminals.

These variants included Atlas clipper, Keyzetsu clipper, and KWN clipper among others. Users are likely lured into this campaign through phishing emails.

Clipper malware variant
Advertisement selling the Atlas Clipper variant on the dark web (Photo: Cyble blog)

Atlas clipper malware variant

Atlas clipper had the capacity to store seven crypto wallet addresses and was offered for a reduced cost of $50 from $100 charged previously.

It takes commands from its command and control server on a Telegram channel. The advertisement for this clipper variant read that it can delete itself if needed or after the fraudulent cryptocurrency transaction was completed.

Researchers analyzed the below sample hash (SHA256) – dabc19aba47fb36756dde3263a69f730c01c2cd3ac149649ae0440d48d7ee4cf. It was a 64-bit binary executable complied in the Go programming language.

Clipper malware variant
Wallet address replaced by the Atlas clipper malware (Photo: Cyble blog)

The clipper variants execute the following commands to perform certain functions.

  1. OpClipboard() function – To initiate the clipper operation and access the clipboard data.
  2. GetClipboardFormatAvailable() function – To retrieve clipboard value and check the format of the cryptocurrency wallet address.
  3. SetClipboardData() function – After finding positive results from the check, the clipper malware replaces the value in the clipboard with a new value.
  4. CloseClipboard() function – To release the clipboard after the malicious replacement of the clipboard value.

Following the above steps, the Atlas clipper variant deletes the executable file but, continues to stay on the system for further fraudulent transactions desired by the criminals behind it.

In this transaction, the targeted user’s information is sent to the Telegram bot by the Clipper malware. Besides the wallet address, the malware steals the username, hardware ID (HWID), and installation path among other data.

Keyzetsu Clipper malware variant

Clipper malware variant
Static file data of the Keyzetsu Clipper malware (Photo: Cyble blog)

The Keyzetsu variant of the Clipper malware can store over 12 cryptocurrency wallet addresses and also relies on a Telegram channel for its C2 server. Its 32-bit executable was compiled in .NET and obfuscated.

The Keyzetsu variant was found to sleep in the beginning using the Sleep function. Researchers analyzed that this was to evade detection.

Keyzetsu looks for similar malware variants in the system through a mutex called “2ILdX2JpexVZieT6mPv2i6Jp3HNFPlby.” This helps run only a single instance of the malware on a system.

This variant also looks for clipboard data like the Atlas Clipper malware. Here, the cybercriminal’s wallet address was encrypted with a Base64 encoding and Gzip compression and hardcoded within the malware file.

KWN Clipper malware variant

The has 7bd03cdf8339f0305d41cad6d3156610517160a116ffd8a4f77e91f56f43ec2e was chosen by researchers to understand the workings of the KWN Clipper malware variant.

It was a 64-bit executable file in the Go language. This variant also accessed clipboard information to perform fraudulent transactions.

Clipper malware variant
Telegram URL of the KWN clipper malware (Photo: Cyble blog)

Mitigation efforts and precautions to prevent cyber attacks via Clipper malware variants

Researchers noted that the Clipper malware functions in tandem with other malware including Coinminer, stealers, and loaders.

CRIL researchers mentioned the following points to maintain safety from similar malware attacks –

  1. Check the authenticity of the source before submitting cryptocurrency wallet data.
  2. Change passwords regularly and use a strong password not shorter than 12 characters.
  3. Opt for high-security login processes including OTPs and multi-factor authentication.
  4. Keep the software update option to update software automatically.
  5. Use credible antivirus software and maintain regular checkups to detect and remove malware promptly.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Atlas clipper malwareClipper malware variantCyble blog Clipper malwareKeyzetsu clipperKWN clipperThe Cyber ExpressThe Cyber Express News
Previous Post

Texas Banking Major PlainsCapital Bank Falls Victim to MOVEit Data Breach

Next Post

ALPHV Blackcat Ransomware Hits Townsquare Media: A Significant Data Breach

Vishwa Pandagle

Vishwa Pandagle

Vishwa Pandagle is a Technical Writer at The Cyber Express. She writes cybersecurity news related to data breaches, ransomware, phishing, and best practices among others. She also writes about cybersecurity developments and likes interacting with experts in this field. When not working, she likes self-reflecting, meditating, volunteering, and going for long walks.

Related Posts

MOVEit Breach Statistics
Data Breach News

Zero-Day Exploitation Impact: MOVEit Breach Statistics Reach 2,120 Organization

by Vishwa Pandagle
September 27, 2023
MEDUSA Cyber Attack
Firewall Daily

MEDUSA Ransomware Group Strikes Again: Italian Company and Canadian Firm Latest Victims

by Ashish Khaitan
September 27, 2023
Ferguson Wellman cyber attack
Firewall Daily

50 Targets and Counting: LostTrust Claims Ferguson Wellman Cyber Attack

by Vishwa Pandagle
September 27, 2023
Iran Telecom Cyber Attack
Firewall Daily

Iran Telecom Cyber Attack: APT IRAN Claims Access to 4TB of Data

by Ashish Khaitan
September 27, 2023
BORN Data Breach
Data Breach News

Ontario Grapples with Unprecedented Data Breach Impacting Newborn Care Registries

by Ashish Khaitan
September 26, 2023 - Updated on September 27, 2023
Next Post
Townsquare Media Data Breach

ALPHV Blackcat Ransomware Hits Townsquare Media: A Significant Data Breach

Latest Issue is Out. Subscribe Now



Follow Us On Google News

Latest Cyber News

Ferguson Wellman cyber attack
Firewall Daily

50 Targets and Counting: LostTrust Claims Ferguson Wellman Cyber Attack

September 27, 2023
Iran Telecom Cyber Attack
Firewall Daily

Iran Telecom Cyber Attack: APT IRAN Claims Access to 4TB of Data

September 27, 2023
BORN Data Breach
Data Breach News

Ontario Grapples with Unprecedented Data Breach Impacting Newborn Care Registries

September 26, 2023 - Updated on September 27, 2023
Sony Data Leak
Firewall Daily

“Major Nelson” Claims Sony Data Leak Alleging RansomedVC Lied

September 26, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance