• Il blog
  • Investimenti
    • Investimenti
    • Refund
  • Domande e risposte
  • Contattaci
  • Il mio account
  • …
    • EnglishEnglish
    • FrançaiseFrançaise
    • EspañolaEspañola
    • ItalianoItaliano
    • РусскийРусский

New MassJacker malware targets piracy users, steals crypto

    A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.

    The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.

    According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.

    One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.

    Related: Hackers have started using AI to churn out malware

    A look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).

    Crypto malware targets array of devices

    Crypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.

    In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.

    Related: Mac users warned over malware ‘Cthulhu’ that steals crypto wallets

    Rather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.

    The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.

    Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

    Uncategorized

    0 Comment

    Navigazione articoli

    UK authorizes charges against NCA officer for alleged Bitcoin theft
    Sacks and his VC firm sold over $200M in crypto and stocks before WH role

    Lascia un commento Annulla risposta

    Image Missing

    Il vostro partner sicuro nella crescita della ricchezza in criptovalute

    Contatti

    • Tower Ten, 20th floor, Strawinskylaan 1665, 1077 XX Amsterdam

    • +4367762309684

    • support@cashorba.com

    • Lun-ven: 9:00 - 17:00

    cashorba.com © 2025 All rights reserved.