🎁 Airdrop Season 7 is LIVE - Answer Fun Questions to Earn $30K Prize Pool Rewards. JOIN NOW!

Fake Microsoft Office Add-Ins Used to Hijack Crypto Transfers, Says Kaspersky

Key Takeaways

  • ​Hackers are spreading fake Microsoft Office add-ins on SourceForge that hide the crypto-stealing malware ClipBanker;
  • ClipBanker swaps copied wallet addresses on infected devices, which redirects crypto transfers to the attacker;
  • The malware targets mostly Russian users, gathers device info, and may install a crypto miner or sell access to others.

Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥

Fake Microsoft Office Add-Ins Used to Hijack Crypto Transfers, Says Kaspersky

Kaspersky, a cybersecurity company, reported on April 8 that a group of attackers has been spreading harmful software by disguising it as Microsoft Office add-ins.

These fake tools, uploaded to the file-sharing site SourceForge, are designed to look like real Office add-ins. But inside, they hide a malicious software called ClipBanker.

ClipBanker works by watching a computer’s clipboard. When someone copies a cryptocurrency wallet address, the malware swaps it with a different address that belongs to the attacker. If the user does not notice the change and makes a transfer, their funds go to the hacker instead.

What is Ripple? Beginner-Friendly XRP Explainer (Animated)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

The fake add-ins are posted on a page that looks like a normal software tool. It includes real-looking buttons and Office files, which makes it show up in search results and look trustworthy. Kaspersky says some of the files are unusually small, which can be a warning sign. Real Office add-ins are much larger, even when compressed.

Additionally, they appear to focus mainly on Russian users. The interface is in Russian, and Kaspersky’s data shows that about 90% of affected users are in Russia.

Once installed, ClipBanker can send details about the device, like the IP address, country, and username, to the attacker using Telegram. The malware also checks if it has already been installed or if antivirus tools are present. If so, the malware may remove itself to avoid being detected.

In some cases, ClipBanker installs a crypto miner, which uses the victim’s device to generate digital coins for the attackers. Kaspersky warns that the access gained through this attack could be sold to others for more serious misuse.

On April 1, Kaspersky reported that discounted Android smartphones were sold with pre-installed malware called Triada. What is it? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

$600 WELCOME BONUS

Earn Huge Exclusive Binance Learners Rewards
5.0 Rating