Submitted via IRC for BoyceMagooglyMonkey
While cryptocurrency has seen tremendous growth over the past year, sending cryptocoins still requires users to send the coins to long and hard to remember addresses. Due to this, when sending cryptocoins, many users will simply copy the address into memory from one application and paste it into another application that they are using to send the coins.
Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this. This type of malware, called CryptoCurrency Clipboard Hijackers, works by monitoring the Windows clipboard for cryptocurrency addresses, and if one is detected, will swap it out with an address that they control. Unless a user double-checks the address after they paste it, the sent coins will go to an address under the attackers control instead the intended recipient.
While we have covered cryptocurrency clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses. This week BleepingComputer noticed a sample of this type of malware that monitors for a over 2.3 million cryptocurrency addresses!
(Score: 3, Insightful) by pkrasimirov on Wednesday July 04 2018, @11:38AM (2 children)
> never swap out a blockchain address that belongs to another malware's scam
Because it will be bad to have the stolen coins in one account instead of another? It will mess all their accounting?
(Score: 2) by zocalo on Wednesday July 04 2018, @11:47AM (1 child)
UNIX? They're not even circumcised! Savages!
(Score: 0) by Anonymous Coward on Wednesday July 04 2018, @05:11PM
Then maintain a much much smaller list of addresses not to swindle.