Researchers have uncovered a clipboard hijacker malware spreading through Discord communities, targeting gamers, streamers, and crypto enthusiasts. The malware silently swaps copied wallet addresses with attacker-controlled ones, diverting funds during transactions.
Campaign Overview
- Threat actor: “RedLineCyber” (posing as RedLine Solutions).
- Distribution: Shared in Discord servers as fake streaming/security tools (
Pro.exe,peeek.exe). - Target audience: Gaming, gambling, and cryptocurrency streaming communities.
- Pitch: Claimed to help manage/protect wallet addresses during live sessions.
Infection Mechanism
- Victim downloads and runs Pro.exe.
- Malware creates CryptoClipboardGuard folder in
%APPDATA%. - Registers persistence via Windows Run key.
- Bundled with PyInstaller, runs even without Python installed.
- Enters a loop, checking clipboard ~3 times per second.
- Detects crypto wallet formats via base64 regex.
- Replaces copied wallet address with attacker’s preset wallet.
- Logs activity in
activity.loginside%APPDATA%\CryptoClipboardGuard.
Why It’s Effective
- No C2 traffic: Operates offline, avoiding detection.
- Low resource usage: Runs quietly in background.
- Human weakness: Exploits reliance on copy-paste for long wallet strings.
- Stealth: Victims only notice after funds arrive in wrong wallet (irreversible).
Impact
- Stolen funds traced across Bitcoin, Ethereum, Solana, Dogecoin, Litecoin, and Tron.
- Targets high-value transfers during live trading/streaming.
- Can remain active for long periods without raising suspicion.
Defensive Recommendations
- Verify wallet addresses manually before confirming transactions.
- Avoid downloading tools shared privately on Discord or gaming servers.
- Monitor
%APPDATA%for suspicious folders likeCryptoClipboardGuard. - Check registry Run keys for unknown executables.
- Use endpoint protection with behavioral monitoring (clipboard manipulation detection).
- Educate users: Streamers and traders should be aware of clipboard hijacking risks.
Takeaway
This campaign highlights how attackers exploit trust in online communities and human shortcuts (copy-paste) to steal cryptocurrency. Clipboard hijackers are simple but devastating, and vigilance at the transaction stage is the only reliable defense.
Leave a Reply