BSV
$57.5
Vol 71.28m
-6.32%
BTC
$101616
Vol 105058.22m
-2.48%
BCH
$483.81
Vol 622.74m
-7.4%
LTC
$109.34
Vol 1892.95m
-9.02%
DOGE
$0.36
Vol 6668.74m
-5.33%
Getting your Trinity Audio player ready...

Owners of crypto assets should be on the alert for the Clipsa malware program. This hacking tool has enabled nefarious individuals to steal cryptocurrencies, as well as take administrator credentials and gain access to unsecured WordPress websites. This has enabled them to be able to replace the current URL with crypto addresses present in a clipboard on these infected machines.

This program has been highly successful at corrupting computers and stealing digital assets. The malware is spread using a malicious executable file, that is often embedded in codec packs for media players. Once the computer or other electronic device is infected, the malware can perform several different actions. This includes such things as searching for crypto wallet addresses that are present in the user’s clipboard, changing addresses so that digital currencies are sent to bad actors’ wallets instead, and searching and stealing wallet.dat files. It is also capable of installing a cryptocurrency miner.

The cybersecurity company Avast appears to have been the first to have discovered this malware strain. They recognized that not only was this a danger to consumers because of the ability of the malware to help hackers to steal digital currencies, but also because of its power to create brute force attacks against WordPress sites. While these types of attacks on WordPress sites are rare, they do occur.

“While we cannot say for sure, we believe the bad actors behind Clipsa steal further data from the breached [WordPress] sites,” said Avast malware researcher Jan Rubín.

While the attack on WordPress sites is an interesting feature, the reality is still that this malware is focused on helping hackers to steal cryptocurrencies from users. The malware will first scan a victim’s computer for the wallet.dat file. Once it has found this file, it will then begin the process of stealing the funds from the owner’s wallet. The file is then uploaded to a server, giving the hackers additional information for later use.

Users are encouraged to be more cautious about installing media players. Those being reported as the most likely to contain this malicious codec are Ultra XVid Codec Pack.exe or Installer_x86-x64_89006.exe.

Because Avast was the first to discover this malware, they have already updated their current cybersecurity package to protect against this particular virus, reporting that they have already stopped over 360,000 attacks. Users are encouraged to contact their virus protection company to ensure that the latest update contains protection against this malware program.

Recommended for you

Google unveils ‘Willow’; Bernstein downplays quantum threat to Bitcoin
Google claims that Willow can eliminate common errors associated with quantum computing, while Bernstein analysts noted that Willow’s 105 qubits...
December 18, 2024
WhatsOnChain adds support for 1Sat Ordinals with new API set
WhatsOnChain now supports the 1Sat Ordinals with a set of APIs in beta testing; with this new development, developers can...
December 13, 2024
Advertisement
Advertisement
Advertisement