
A new attack on users which gains control of Windows clipboard to swap out addresses is already monitoring 2.3 million targets, sources June 30.
The , part of a family of threats known as “clipboard hijackers,” secretly gains control of memory, running in the background to ensure users do not notice its presence. It then replaces the bitcoin address that the user has copied into the clipboard with the address of the attacker, which the user later unknowingly pastes and sends their coins to.
“Unless a user double-checks the pasted address, they will have no idea that this swap took place,” Bleeping Computer , adding an explanatory video about how the malware works.
bitcoin users face a variety of vulnerabilities when using hardware to transact, regardless whether this is an smartphone, Windows PC or other device.
As Cointelegraph has frequently reported, the list of threats , even incorporating emails, while other malicious entities swap out destination addresses in .
“Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this,” Bleeping Computer adds.
Keeping up-to-date antivirus software running constitutes users’ main defence against the problem, along with double-checking the destination bitcoin address of a transaction if this has been entered using a copy-paste function.
Some such as TREZOR additionally force users to double-check addresses for manipulations whenever one is generated.
Published at Mon, 02 Jul 2018 15:40:00 +0000