Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID

A newly discovered Trojan called “CryptoShuffler” stole around $140,000 from cryptocurrency wallets by replacing the Original Wallet address with another and transfer into attacker wallet.

Once CryptoShuffler spots the address of a cryptocurrency wallet, it will intrude the victim’s wallet at the time of transaction and replace the attacker wallet address.  as a result, the cryptocurrency will be Transferred into attacker Wallet address instead of the User intended recipient wallet ID.

According to Kaspersky, The malware has been around since last year and has been targeting many popular cryptocurrencies including Bitcoin, ZCash, Ethereum, Monero, among others.

Cryptocurrencies Malware evolving with much more capabilities even it has targeting android using aswell directly from Google play store.

The safest way to store cryptocurrency is through a hardware or paper wallet. We recommend reading this cryptocurrency wallets guide by TotalCrypto to learn more about safe storage options.

The basic format of  Crypto currency transaction, if a user wants to transfer crypto coins to another user,  they need to know the recipient’s wallet ID ,a unique multi-digit number.

In This case ,CryptoShuffler Trojan monitor the device’s clipboard, utilized by users when making a payment and it will replace the malware authors wallet ID in software address line.

Also Read: Dangerous Crypto Currency Mining Malware Apps Found on Google Play Store

Eventually, it will be replaced by the malware author’s wallet ID when user pasting the ID of original user recipient and finally attacker wallet ID and send the money to attacker wallet.

Victims will be having no idea about this malicious activities by this CryptoShuffler Trojan while making the transaction.

Till now this Malware author earned 23 BTC about $140,000 at the current exchange rate in Dollar.

The other cryptocurrency wallets belonging to CryptoShuffler’s creators were found to contain sums ranging from tens to thousands of dollars.It took the Trojan a little more than a year to collect that money. Peak activity in late 2016 was followed by a slump, but then in June 2017, CryptoShuffler reawakened. Kaspersky Said.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…

5 hours ago

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…

5 hours ago

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…

5 hours ago

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…

5 hours ago

New Windows Zero-Day Vulnerability Let Attackers Steal Credentials From Victim’s Machine

A security researcher discovered a vulnerability in Windows theme files in the previous year, which…

5 hours ago

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…

6 hours ago