BSV
$65.37
Vol 59.87m
-7.13%
BTC
$89403
Vol 51665.7m
-1.15%
BCH
$427.72
Vol 801.51m
-7.69%
LTC
$86.36
Vol 1446.31m
-9.14%
DOGE
$0.36
Vol 9626.42m
-0.65%
Getting your Trinity Audio player ready...

Owners of crypto assets should be on the alert for the Clipsa malware program. This hacking tool has enabled nefarious individuals to steal cryptocurrencies, as well as take administrator credentials and gain access to unsecured WordPress websites. This has enabled them to be able to replace the current URL with crypto addresses present in a clipboard on these infected machines.

This program has been highly successful at corrupting computers and stealing digital assets. The malware is spread using a malicious executable file, that is often embedded in codec packs for media players. Once the computer or other electronic device is infected, the malware can perform several different actions. This includes such things as searching for crypto wallet addresses that are present in the user’s clipboard, changing addresses so that digital currencies are sent to bad actors’ wallets instead, and searching and stealing wallet.dat files. It is also capable of installing a cryptocurrency miner.

The cybersecurity company Avast appears to have been the first to have discovered this malware strain. They recognized that not only was this a danger to consumers because of the ability of the malware to help hackers to steal digital currencies, but also because of its power to create brute force attacks against WordPress sites. While these types of attacks on WordPress sites are rare, they do occur.

“While we cannot say for sure, we believe the bad actors behind Clipsa steal further data from the breached [WordPress] sites,” said Avast malware researcher Jan Rubín.

While the attack on WordPress sites is an interesting feature, the reality is still that this malware is focused on helping hackers to steal cryptocurrencies from users. The malware will first scan a victim’s computer for the wallet.dat file. Once it has found this file, it will then begin the process of stealing the funds from the owner’s wallet. The file is then uploaded to a server, giving the hackers additional information for later use.

Users are encouraged to be more cautious about installing media players. Those being reported as the most likely to contain this malicious codec are Ultra XVid Codec Pack.exe or Installer_x86-x64_89006.exe.

Because Avast was the first to discover this malware, they have already updated their current cybersecurity package to protect against this particular virus, reporting that they have already stopped over 360,000 attacks. Users are encouraged to contact their virus protection company to ensure that the latest update contains protection against this malware program.

Recommended for you

Sentinel Node upholds heightened security with 56M snapshots
CERTIHASH keeps up with its mission to offer enterprises heightened security for their data with BSV-powered Sentinel Node, recently registering...
November 14, 2024
ODHack 9.0: Better wallet, easy testnet coins for developers
OnlyDust's ODHack 9.0 hackathon event provides developers building on the BSV blockchain with new ways to test their applications without...
November 8, 2024
Advertisement
Advertisement
Advertisement