Close Menu
Cryprovideos
    What's Hot

    Ark Invest CEO Cathie Wood Doubles Down on Bitcoin Prediction, Says Base Case Target for BTC Remains $700,000 – The Daily Hodl

    May 9, 2025

    Lido proposes twin governance improve to empower stETH holders in selections

    May 9, 2025

    Understanding MACD: A Key Indicator for Recognizing Momentum Shifts

    May 9, 2025
    Facebook X (Twitter) Instagram
    Cryprovideos
    • Home
    • Crypto News
    • Bitcoin
    • Altcoins
    • Markets
    Cryprovideos
    Home»Crypto News»Hackers disguise crypto address-swapping malware in Microsoft Workplace add-in bundles
    Hackers disguise crypto address-swapping malware in Microsoft Workplace add-in bundles
    Crypto News

    Hackers disguise crypto address-swapping malware in Microsoft Workplace add-in bundles

    By Crypto EditorApril 9, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Malicious actors are trying to steal crypto with malware embedded in pretend Microsoft Workplace extensions uploaded to the software program internet hosting website SourceForge, in response to cybersecurity agency Kaspersky.

    One of many malicious listings, referred to as “officepackage,” has actual Microsoft Workplace add-ins however hides a malware referred to as ClipBanker that replaces a copied crypto pockets tackle on a pc’s clipboard with the attacker’s tackle, Kaspersky’s Anti-Malware Analysis Staff stated in an April 8 report.

    “Customers of crypto wallets sometimes copy addresses as a substitute of typing them. If the gadget is contaminated with ClipBanker, the sufferer’s cash will find yourself someplace fully sudden,” the group stated.

    The pretend challenge’s web page on SourceForge mimics a reputable developer device web page, displaying the workplace add-ins and obtain buttons and may seem in search outcomes.

    Hackers disguise crypto address-swapping malware in Microsoft Workplace add-in bundles

    Kaspersky stated it discovered a crypto-stealing malware on the software program internet hosting web site SourceForge. Supply: Kaspersky

    Kaspersky stated one other function of the malware’s an infection chain includes sending contaminated gadget info akin to IP addresses, nation and usernames to the hackers via Telegram.

    The malware may scan the contaminated system for indicators it’s already been put in beforehand or for antivirus software program and delete itself.

    Attackers might promote system entry to others

    Kaspersky says a number of the recordsdata within the bogus obtain are small, which raises “purple flags, as workplace purposes are by no means that small, even when compressed.” 

    Different recordsdata are padded out with junk to persuade customers they’re a real software program installer.

    The agency stated attackers safe entry to an contaminated system “via a number of strategies, together with unconventional ones.”

    “Whereas the assault primarily targets cryptocurrency by deploying a miner and ClipBanker, the attackers might promote system entry to extra harmful actors.” 

    The interface is in Russian, which Kaspersky speculates might imply it targets Russian-speaking customers.