Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday July 04 2018, @08:40AM   Printer-friendly
from the Only-cut-n-paste-one-half-at-a-time dept.

Submitted via IRC for BoyceMagooglyMonkey

While cryptocurrency has seen tremendous growth over the past year, sending cryptocoins still requires users to send the coins to long and hard to remember addresses. Due to this, when sending cryptocoins, many users will simply copy the address into memory from one application and paste it into another application that they are using to send the coins.

Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this. This type of malware, called CryptoCurrency Clipboard Hijackers, works by monitoring the Windows clipboard for cryptocurrency addresses, and if one is detected, will swap it out with an address that they control. Unless a user double-checks the address after they paste it, the sent coins will go to an address under the attackers control instead the intended recipient.

While we have covered cryptocurrency clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses. This week BleepingComputer noticed a sample of this type of malware that monitors for a over 2.3 million cryptocurrency addresses!

Source: https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-monitors-23-million-bitcoin-addresses/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Wednesday July 04 2018, @05:43PM (8 children)

    by Anonymous Coward on Wednesday July 04 2018, @05:43PM (#702645)

    You are incorrect.

    RTFA and you'll see the DLL contains a resource of 2.3 million addresses they check against. If the address in in that list of 2.3 million they swap it for another one. If not, they don't.

  • (Score: 2) by Snow on Wednesday July 04 2018, @05:53PM (6 children)

    by Snow (1601) on Wednesday July 04 2018, @05:53PM (#702650) Journal

    I did RTFA and it does not say that at all.

    The article says that if a crypto address is detected, it replaces it with one under their control. It does not say anywhere that the address in the clipboard is compared to the list. (but sometimes my reading is shit, so please prove me wrong :) )

    I believe the list is a list of replacement values.

    • (Score: 0) by Anonymous Coward on Wednesday July 04 2018, @05:57PM (5 children)

      by Anonymous Coward on Wednesday July 04 2018, @05:57PM (#702652)

      Prove you wrong? Sure. Just watch the video in the article. It shows the resource with the 2.3 million addresses to match against as well as demonstrating the malware in action.

      I'll wait.

      • (Score: 2) by Snow on Wednesday July 04 2018, @07:19PM (4 children)

        by Snow (1601) on Wednesday July 04 2018, @07:19PM (#702694) Journal

        The video shows the exact behavior I explain. The reporter is incorrect in their understanding/explanation.

        Look at 2:50. We see the end of the list of addresses. They appear to be sorted in order. The end of the list is 1zz[...]

        Later in the video he copies a multisig address (starts with a 3) [5:28] and the address is replaced with an address starting with 1HMF[...]. The list does not contain any multisig address, so a normal address is substituted in it's place.

        Also notice that the substituted addresses start with the same 3 characters as the original. That list is how that happens.

        • (Score: 1, Insightful) by Anonymous Coward on Wednesday July 04 2018, @07:39PM (3 children)

          by Anonymous Coward on Wednesday July 04 2018, @07:39PM (#702705)

          So the guy who is a professional at this, and who uncovered the malware, and spent hours working with it, and who shows the 2.3 million addresses, and who demonstrates how it works is wrong about everything. But you, you who thinks he knows more than anyone else, is right?

          Keep telling yourself that; you couldn't be more wrong. And repeat George Constanza's mantra: "It's not a lie if you believe it."

          • (Score: 2) by Snow on Wednesday July 04 2018, @08:00PM (2 children)

            by Snow (1601) on Wednesday July 04 2018, @08:00PM (#702719) Journal

            Yes.

            The bitcoin address space is far, far, far too large to match in the way you suggest. 2.5M addresses is .00000[...]WhateverNumberIHaveAbove of the available address space. The chances of ever stumbling upon a collision is infinitesimally small.

            • (Score: 2) by frojack on Wednesday July 04 2018, @11:56PM (1 child)

              by frojack (1554) on Wednesday July 04 2018, @11:56PM (#702774) Journal

              They don't have to catch that transaction where you send your mom a fraction of a bitcoin.

              They just have to have the 2.5Million most active accounts in their list, and redirect a few transactions from those with the malware to any of those.

              They aren't trying to hijack EVERY transaction for pete sake. Use your head.

              --
              No, you are mistaken. I've always had this sig.
              • (Score: 3, Informative) by Snow on Thursday July 05 2018, @03:45AM

                by Snow (1601) on Thursday July 05 2018, @03:45AM (#702828) Journal

                This is just a simple evolution of malware that has been around for years.

                The original version would just monitor the clipboard for a bitcoin address and then substitute another. This could be noticed if the user was looking at the address when they pasted it. To get around that, this version has a list of precomputed addresses. It will continue to monitor for a bitcoin address, but this time it will take the first 3 characters and find a match in it's list and use that address so when the paste happens, it looks somewhat similar.

                Take a look at the last address on the list:
                https://www.blockchain.com/en/btc/address/1zzzmmAGUMpkXzg5MSy8VAyzT5syt24Am [blockchain.com]

                It has NO transactions. This is not a list of most active accounts. It's a list of precomputed addresses that can be swapped in quickly to make the swap more believable. It's too computationally expensive to generate a believable fake in real-time.

                I'm sorry, I'm just -really- into bitcoin. I'm not trying to be argumentative or anything; I'm just really passionate about it. :)

  • (Score: 0) by Anonymous Coward on Wednesday July 04 2018, @07:55PM

    by Anonymous Coward on Wednesday July 04 2018, @07:55PM (#702713)

    Stop feeding this troll. Let him go back to hacking his toaster where nobody burns toast like he does. Nobody.