Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Finance > BITCOIN STEALERS ARE BACK: HUNT FOR USERS’ CRYPTOSAVINGS CONTINUES
    Finance

    BITCOIN STEALERS ARE BACK: HUNT FOR USERS’ CRYPTOSAVINGS CONTINUES

    BITCOIN STEALERS ARE BACK: HUNT FOR USERS’ CRYPTOSAVINGS CONTINUES

    Published by Gbaf News

    Posted on November 1, 2017

    Featured image for article about Finance

    Kaspersky Lab researchers have discovered a new malware which steals cryptocurrencies from a user’s wallet by replacing their address with its own in the device’s clipboard. Criminals are targeting popular cryptocurrencies such as Bitcoin, Ethereum, Zcash, Dash, Monero and others. Indeed, criminals have already succeeded with bitcoin wallets, earning almost £105,923 overall, according to our data. In addition, experts have found a new Trojan, designed for Monero mining, with some samples currently available in the wild.

    With the cryptocurrency boom continuing across the world, it is fast becoming an attractive target for cybercriminals. Kaspersky Lab researchers have already seen a rise of miners, which have affected thousands of computers and generated hundreds of thousands of dollars. In addition, experts have noticed that criminals are starting to use less advanced techniques and are spending less time and resources in this area. According to the research, cryptocurrency stealers – which have been increasing in prevalence since 2014, are again putting users’ crypto savings at risk.

    Kaspersky Lab researchers have discovered a new CryptoShuffler Trojan, designed to change the addresses of users’ cryptocurrency wallets in the infected device’s clipboard (a software facility used for short-term data storage). Clipboard hijacking attacks have been known for years, redirecting users to malicious websites and targeting online payments systems. However, cases involving a cryptocurrency host address are rare.

    In most cryptocurrencies, if the user wants to transfer crypto coins to another user, they need to know the recipient’s wallet ID – a unique multi-digit number. Here is how the CryptoShuffler exploits the system’s need to operate with these numbers.

    After initialising, the CryptoShuffler Trojan starts to monitor the device’s clipboard, utilised by users when making a payment. This involves copying wallets’ numbers and pasting them into the “destination address” line of the software that is used to carry out a transaction. The Trojan replaces the user’s wallet with one owned by the malware creator, meaning when the user pastes the wallet ID to the destination address line, it is not the address they originally intended to send money to. As a result, the victim transfers his or her money directly to the criminals, unless an attentive user spots the sudden replacement.

    The latter is usually not the case, since multi-digit numbers and the wallets’ addresses in blockchain are typically very difficult to remember. Therefore, it’s hard to define any distinctive features in the transaction line, even if it is directly in front of the user’s eyes.

    Destination replacement in the clipboard occurs instantly, thanks to the simplicity of searching for wallet addresses: the majority of cryptocurrency wallets have a constant position in the transaction line and always use a certain number of characters. Thus, intruders can easily create regular codes to replace them. Based on the research, CryptoShuffler works with a wide range of the most popular cryptocurrencies, such as Bitcoin, Ethereum, Zcash, Dash, Monero and others.

    So far, based on observations from Kaspersky Lab researchers, the criminals behind the CryptoShufflertrojan have mostly succeeded in attacks against Bitcoin wallets – they were able to steal 23 BTC, which is equivalent to almost £105,923. The total amounts in other wallets ranges from a few dollars to several thousand dollars.

    “Cryptocurrency is not a far-off technology anymore. It is getting into our daily lives and actively spreading around the world, becoming more available for users, as well as a more appealing target for criminals. Lately we’ve observed an increase in malware attacks targeting different types of cryptocurrencies, and we expect this trend to continue. So, users considering cryptocurrency investments at this time need to think about ensuring they have proper protection”, says Sergey Yunakovsky, malware analyst at Kaspersky Lab.

    Experts have also found another Trojan targeting the Monerocryptocurrency – Discordia Miner, which is designed to upload and run files from a remote server. According to the research, there are some performance similarities with the NukeBot Trojan, discovered earlier this year. As in the NukeBot case, the Trojan’s source codes have been shared on underground hacking forums.

    We recommend that users install robust security solutions that provide dedicated functionality for protecting financial transactions, like the Safe Money feature in flagship Kaspersky Lab solutions. For greater security, this feature scans for vulnerabilities that are known to have been exploited by cybercriminals, constantly checks for specialised malware, guards transactions from intrusion with the help of Protected Browser technology and specifically protects the clipboard where sensitive data could be stored during copy/paste operations.

    Kaspersky Lab products successfully detect and block these malware with the following detection names:

    • Trojan-Banker.Win32.CryptoShuffler.gen
    • Trojan.Win32.DiscordiaMiner

    Kaspersky Lab researchers have discovered a new malware which steals cryptocurrencies from a user’s wallet by replacing their address with its own in the device’s clipboard. Criminals are targeting popular cryptocurrencies such as Bitcoin, Ethereum, Zcash, Dash, Monero and others. Indeed, criminals have already succeeded with bitcoin wallets, earning almost £105,923 overall, according to our data. In addition, experts have found a new Trojan, designed for Monero mining, with some samples currently available in the wild.

    With the cryptocurrency boom continuing across the world, it is fast becoming an attractive target for cybercriminals. Kaspersky Lab researchers have already seen a rise of miners, which have affected thousands of computers and generated hundreds of thousands of dollars. In addition, experts have noticed that criminals are starting to use less advanced techniques and are spending less time and resources in this area. According to the research, cryptocurrency stealers – which have been increasing in prevalence since 2014, are again putting users’ crypto savings at risk.

    Kaspersky Lab researchers have discovered a new CryptoShuffler Trojan, designed to change the addresses of users’ cryptocurrency wallets in the infected device’s clipboard (a software facility used for short-term data storage). Clipboard hijacking attacks have been known for years, redirecting users to malicious websites and targeting online payments systems. However, cases involving a cryptocurrency host address are rare.

    In most cryptocurrencies, if the user wants to transfer crypto coins to another user, they need to know the recipient’s wallet ID – a unique multi-digit number. Here is how the CryptoShuffler exploits the system’s need to operate with these numbers.

    After initialising, the CryptoShuffler Trojan starts to monitor the device’s clipboard, utilised by users when making a payment. This involves copying wallets’ numbers and pasting them into the “destination address” line of the software that is used to carry out a transaction. The Trojan replaces the user’s wallet with one owned by the malware creator, meaning when the user pastes the wallet ID to the destination address line, it is not the address they originally intended to send money to. As a result, the victim transfers his or her money directly to the criminals, unless an attentive user spots the sudden replacement.

    The latter is usually not the case, since multi-digit numbers and the wallets’ addresses in blockchain are typically very difficult to remember. Therefore, it’s hard to define any distinctive features in the transaction line, even if it is directly in front of the user’s eyes.

    Destination replacement in the clipboard occurs instantly, thanks to the simplicity of searching for wallet addresses: the majority of cryptocurrency wallets have a constant position in the transaction line and always use a certain number of characters. Thus, intruders can easily create regular codes to replace them. Based on the research, CryptoShuffler works with a wide range of the most popular cryptocurrencies, such as Bitcoin, Ethereum, Zcash, Dash, Monero and others.

    So far, based on observations from Kaspersky Lab researchers, the criminals behind the CryptoShufflertrojan have mostly succeeded in attacks against Bitcoin wallets – they were able to steal 23 BTC, which is equivalent to almost £105,923. The total amounts in other wallets ranges from a few dollars to several thousand dollars.

    “Cryptocurrency is not a far-off technology anymore. It is getting into our daily lives and actively spreading around the world, becoming more available for users, as well as a more appealing target for criminals. Lately we’ve observed an increase in malware attacks targeting different types of cryptocurrencies, and we expect this trend to continue. So, users considering cryptocurrency investments at this time need to think about ensuring they have proper protection”, says Sergey Yunakovsky, malware analyst at Kaspersky Lab.

    Experts have also found another Trojan targeting the Monerocryptocurrency – Discordia Miner, which is designed to upload and run files from a remote server. According to the research, there are some performance similarities with the NukeBot Trojan, discovered earlier this year. As in the NukeBot case, the Trojan’s source codes have been shared on underground hacking forums.

    We recommend that users install robust security solutions that provide dedicated functionality for protecting financial transactions, like the Safe Money feature in flagship Kaspersky Lab solutions. For greater security, this feature scans for vulnerabilities that are known to have been exploited by cybercriminals, constantly checks for specialised malware, guards transactions from intrusion with the help of Protected Browser technology and specifically protects the clipboard where sensitive data could be stored during copy/paste operations.

    Kaspersky Lab products successfully detect and block these malware with the following detection names:

    • Trojan-Banker.Win32.CryptoShuffler.gen
    • Trojan.Win32.DiscordiaMiner
    Related Posts
    Analysis-Consumer goods firms cut CEO tenures short in push for growth
    Analysis-Consumer goods firms cut CEO tenures short in push for growth
    BAE Systems halves stake in Kazakh carrier Air Astana
    BAE Systems halves stake in Kazakh carrier Air Astana
    Tesla ramps up battery cell investments at German gigafactory
    Tesla ramps up battery cell investments at German gigafactory
    Stellantis says EU proposals fall short on auto industry's energy transition needs
    Stellantis says EU proposals fall short on auto industry's energy transition needs
    OpenAI taps former UK finance minister Osborne to lead global Stargate expansion
    OpenAI taps former UK finance minister Osborne to lead global Stargate expansion
    US threatens countermeasures after EU fine on Musk's X
    US threatens countermeasures after EU fine on Musk's X
    EU drops 2035 combustion engine ban as global EV shift faces reset
    EU drops 2035 combustion engine ban as global EV shift faces reset
    Volkswagen welcomes EU move to drop combustion engine ban
    Volkswagen welcomes EU move to drop combustion engine ban
    Incoming Kraft Heinz CEO says he reserves right to improve split
    Incoming Kraft Heinz CEO says he reserves right to improve split
    FCAS fighter jet "very unlikely" after ministers' talks, source says
    FCAS fighter jet "very unlikely" after ministers' talks, source says
    Campari's parent company settles tax dispute with 405 million euro payment
    Campari's parent company settles tax dispute with 405 million euro payment
    Universal offers to sell Downtown's Curve to win EU approval, source says
    Universal offers to sell Downtown's Curve to win EU approval, source says

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Finance

    Explore more articles in the Finance category

    Reactions to European Commission proposal to reverse 2035 combustion engine ban

    Reactions to European Commission proposal to reverse 2035 combustion engine ban

    Italy's offshore wind push languishes, putting climate goals at risk

    Italy's offshore wind push languishes, putting climate goals at risk

    New Rome metro stations showcase ancient treasures after years of delays

    New Rome metro stations showcase ancient treasures after years of delays

    Exclusive-California Pizza Kitchen reaches buyout deal, names new leadership

    Exclusive-California Pizza Kitchen reaches buyout deal, names new leadership

    Greeks protest against low wages ahead of 2026 budget vote

    Greeks protest against low wages ahead of 2026 budget vote

    AI boom seen lifting chipmaking equipment sales 9% to $126 billion in 2026

    AI boom seen lifting chipmaking equipment sales 9% to $126 billion in 2026

    New Czech government signals tough stance on migration, EU emissions rules

    New Czech government signals tough stance on migration, EU emissions rules

    Exclusive-Swiss firm Barry Callebaut eyes separating cocoa division amid price volatility, sources say

    Exclusive-Swiss firm Barry Callebaut eyes separating cocoa division amid price volatility, sources say

    Zaporizhzhia nuclear plant running on single power line, Russia says

    Zaporizhzhia nuclear plant running on single power line, Russia says

    EU talks to fund Ukraine with Russian assets make progress, key decisions seen Thursday

    EU talks to fund Ukraine with Russian assets make progress, key decisions seen Thursday

    Shell greenlights US Gulf waterflood project to boost oil recovery

    Shell greenlights US Gulf waterflood project to boost oil recovery

    Saudi firm Midad among frontrunners to buy Lukoil's global assets, sources say

    Saudi firm Midad among frontrunners to buy Lukoil's global assets, sources say

    View All Finance Posts
    Previous Finance PostSELF ASSESSMENT PAPER DEADLINE: IGNORANCE COULD LAND SHARING ECONOMY USERS IN HOT WATER WITH THE TAXMAN
    Next Finance PostLIVING FOR THE CASH MACHINE – HAPPINESS AND WEALTH IN THE UK