Is Your Crypto Safe? XPhase Clipper Malware Steals Coins with a Click

The XPhase Clipper Malware poses a serious threat to cryptocurrency users by pilfering sensitive information.

A new strain of malware dubbed XPhase Clipper has been stealthily targeting cryptocurrency users. This Clipper malware infiltrates unsuspecting victims’ systems through deceptive websites masquerading as authentic cryptocurrency platforms. 

Source: Cyble

Cybersecurity experts at Cyble Research and Intelligence Labs (CRIL) have found this concerning trend where a large-scale operation is using cloned YouTube videos to target unsuspecting victims on the internet.

This is a churned-down version of the report, shedding light on its modus operandi and the infection chain of XPhase Clipper malware. 

Understanding the XPhase Clipper Malware Campaign

Source: Cyble

Clipper malware poses a serious threat to cryptocurrency users by pilfering sensitive information, particularly cryptocurrency wallet addresses, from the clipboard. 

With the increasing popularity of cryptocurrencies like Bitcoin and Ethereum, cybercriminals are increasingly exploiting users to abscond with their funds.

XPhase Clipper represents a sophisticated iteration of this malware strain, designed to intercept and manipulate copied cryptocurrency wallet addresses, rerouting funds to the attackers’ accounts. 

The threat actors behind the XPhase Clipper malware campaign are exclusively targeting cryptocurrency users worldwide, deploying a series of deceptive tactics to ensnare victims. 

Source: Cyble

Notably, phishing sites impersonating reputable platforms such as Metamask and Wazirx have emerged as conduits for spreading the XPhase Clipper payload.

Source: Cyble

These malicious sites lure users into downloading a zip file housing an array of malicious components, including a dropper executable, VB Script, and Batch script files, culminating in the execution of the clipper payload in the form of a DLL file.

Source: Cyble

XPhase Clipper Malware Targets Indian Crypto Users

Upon closer examination, CRIL found that the infection chain is meticulously orchestrated, with each stage serving to conceal the malicious activities of the XPhase Clipper. 

The VB Script plays an important role in facilitating the download and execution of the clipper payload, while the Batch script ensures persistence by adding a registry entry for automatic execution of the malware upon system startup. 

Source: Cyble

Such obfuscation tactics, coupled with the deployment of deceptive error messages, serve to hide the malware’s operations and evade detection.

A closer look at the campaign reveals a discernible pattern in the targeting strategy employed by the threat actors.

While the campaign casts a wide net, with cryptocurrency users worldwide falling prey to its machinations, there is a noticeable emphasis on targeting specific demographics, notably Indian cryptocurrency enthusiasts.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Recent Posts

The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

TCE weekly round shares cybersecurity news: AI threats, mobile malware, space security, and regulatory updates shaping the global threat landscape.

12 hours ago

UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

By formalizing cyber career pathways, the government is attempting to make public service roles more competitive and sustainable.

15 hours ago

National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide

The NIS2 Directive and Ireland’s National Cyber Security Bill place cybersecurity accountability on management boards, with fines and personal liability.

15 hours ago

Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

iPhone and iPad running iOS 26 can now handle "restricted" NATO information.

15 hours ago

OpenClaw Vulnerability Exposes How an Open-Source AI Agent Can Be Hijacked

The OpenClaw vulnerability exposes a flaw that lets websites silently hijack open-source AI agents through a localhost attack chain.

17 hours ago

India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

The collaborative approach is particularly relevant as private players now design, launch, and operate critical satellite services.

17 hours ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More