A New Malicious Campaign Whip Around $60,000 of Bitcoin

A New Malicious Campaign Whip Around $60,000 of Bitcoin

July 2018, saw the reports of a recently discovered
malicious campaign by the Fortiguard Labs. The campaign “Bitcoin Stealer”
is as of now held responsible of stealing roughly $60,000 worth in Bitcoin.
The researchers from the FortiGuard Labs initially
ran over a threat that at first coordinated a few tenets particular to the
Jigsaw ransom ware back in April 2018, yet later on after a considerably more
critical look it was revealed that the threat, which contained the assembly
name “BitcoinStealer.exe,” did not figure like a ransom ware at all.
As unlike to ransom ware, the Bitcoin Stealer rather
used an executable to screen the contaminated PC’s clipboard content for
indications of a bitcoin address. When it finds one of these addresses, the
malware at that point replaces that replicated bitcoin address with an
alternate one containing similar strings at both the start and the end of that
wallet address.
By using this technique, the malware basically mixes
itself specifically into bitcoin transactions and after that, halfwit users into
transferring cryptocurrency to the wallet of the cybercriminal utilizing
Bitcoin Stealer.

As indicated by Techopedia, these stealing programs
are cases of clipboard hijacking, an attack strategy through which attackers
generally change clipboard content to guide browser users to a malignant
The Programmers however, are additionally known to
utilize a strategy called “pastejacking” to meddle with commands
replicated from a web browser and paste into the terminal.

The question though that arises now is thusly aimed
at the security specialists with respect to whether there will be sufficient
insurance given against such episodes of clipboard modification attacks as digital
attackers indeed have a long history of targeting clipboards in order to steal
cryptocurrency or redirect users to malware.

Share this with Your friends:

Leave a Reply

Your email address will not be published. Required fields are marked *