Cybersecurity Professional Issues Safety Measures Against "Clipper" Malware
Thu, January 23, 2020

Cybersecurity Professional Issues Safety Measures Against "Clipper" Malware

Cybersecurity researcher Lukas Stefanko discovered the malware called "Clipper" earlier this year, which hackers employ to steal cryptocurrencies from unsuspecting victims / Photo by: via Shutterstock


Lukas Stefanko is a cybersecurity researcher who discovered a strategy earlier this year that hackers employ to steal cryptocurrencies from unsuspecting victims.

The online attackers reportedly use a malware called "Clipper," which is frequently deployed via fake or infected applications on the Google Play store.

This method supplants the cryptocurrency address of a user with the own address of the hacker when copying and pasting.

Stefanko cautioned cryptocurrency holders against using Cortana. This kind of Windows software is a built-in Artificial Intelligence helper that includes key-logging capabilities that hackers can utilize, he said.

Fighting the new malware methods can also be made possible by double-checking every single digit of a pasted cryptocurrency address, regardless of how tedious this may seem.

This technique is reportedly the simplest manner to prevent a cryptocurrency holder from becoming a prey of malware-oriented scams, according to the report published online by Yahoo! Finance, a media company that offers financial news, data, commentary, stock quotes, press releases, financial reports, original content, and online tools for personal finance management.

Clipper is believed to be the same malware that online attackers employed on Windows devices in 2017. These hackers' strategy involves waiting for users to copy a receiving cryptocurrency wallet address.

Then, these cyber-felons reportedly would hijack the clipboard of a user's computer, supplanting the paste value with their own wallet address. This technique leads cryptocurrency users to send their money directly to a wallet which they do not possess control of.

Hackers are reportedly eager to use Clipper because they believe it is an effective technique to get hold of their victims' digital assets. 

Moreover, cryptocurrency analysts believe that the digital felons are aware that plenty of users neglect to double-check the pasted address, and instead depend on the copied and pasted information that they think is precise.

Clipper is delivered through downloads, in which some are imitations of legal cryptocurrency software like MetaMask. Stefanko pointed out that the malicious downloads are not limited to low-quality and unreliable application stores or websites.

Some of them are even being downloaded via highly trustworthy websites like CNET, he remarked.