skip to Main Content
bitcoin
Bitcoin (BTC) $ 98,238.32 0.05%
ethereum
Ethereum (ETH) $ 3,437.00 1.46%
tether
Tether (USDT) $ 0.999578 0.02%
xrp
XRP (XRP) $ 2.25 2.29%
bnb
BNB (BNB) $ 707.05 0.57%
solana
Solana (SOL) $ 194.98 1.98%
dogecoin
Dogecoin (DOGE) $ 0.325485 2.50%
usd-coin
USDC (USDC) $ 1.00 0.02%
staked-ether
Lido Staked Ether (STETH) $ 3,433.27 1.46%
cardano
Cardano (ADA) $ 0.896005 3.25%

New Malware Swaps Out Crypto Wallet Addresses as You Type Them


news

A new bit of malware called Masad Stealer can replace wallet addresses as you type them thanks to malicious code injected into your browser. According to Juniper Networks, it also steals:

PC and system information


Credit Card Browser Data


Browser passwords


Installed software and processes


Desktop Files


Screenshot of Desktop


Browser cookies


Steam files


AutoFill browser fields


Discord and Telegram data


FileZilla files

The program dumps this information to the malware controller’s Telegram account, ensuring relative security for the data it steals. It can also clip and change monero, litecoin, zcash, dash and ethereum addresses automatically and uses special search functions to pinpoint these addresses on your clipboard. Once it swaps the addresses it can intercept crypto as its being sent to legitimate wallets.

The particular version of the malware Juniper studied sent crypto to this wallet which currently contains almost a one full bitcoin.

“Based on our telemetry, Masad Stealer’s main distribution vectors are masquerading as a legitimate tool or bundling themselves into third party tools,” wrote the research organization. “Threat actors achieve end user downloads by advertising in forums, on third party download sites or on file sharing sites.”

The software masquerades as useful-looking software like Tradebot_binance.exe, Galaxy Software Update.exe, and Fortniteaimbot  2019.exe. Once infected, the computer then begins communicating with the command and control Telegram channel and sends back private data.

The malware allegedly costs $40 on the dark web and is completely configurable and very dangerous, said Juniper.

“Juniper Threat Labs believes that Masad Stealer represents an active and ongoing threat.  Command and Control bots are still alive and responding as of this writing, and the malware appears to still be available for purchase on the black market,” wrote the researchers.

Hacker image via Michael Geiger/Unsplash

Loading data ...
Comparison
View chart compare
View table compare
Back To Top