New Malware Swaps Out Crypto Wallet Addresses as You Type Them

A newly discovered piece of malware can secretly steal your crypto wallets and passwords.

AccessTimeIconSep 27, 2019 at 5:00 p.m. UTC
Updated Dec 10, 2022 at 8:08 p.m. UTC
10 Years of Decentralizing the Future
May 29-31, 2024 - Austin, TexasThe biggest and most established global hub for everything crypto, blockchain and Web3.Register Now
A new bit of malware called  Masad Stealerhttps://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559 can replace wallet addresses as you type them thanks to malicious code injected into your browser. According to Juniper Networks, it also steals:

PC and system information

Credit Card Browser Data

Browser passwords

Installed software and processes

Desktop Files

Screenshot of Desktop

Browser cookies

Steam files

AutoFill browser fields

Discord and Telegram data

FileZilla files

The program dumps this information to the malware controller's Telegram account, ensuring relative security for the data it steals. It can also clip and change monero, litecoin, zcash, dash and ethereum addresses automatically and uses special search functions to pinpoint these addresses on your clipboard. Once it swaps the addresses it can intercept crypto as its being sent to legitimate wallets.

The particular version of the malware Juniper studied sent crypto to this wallet which currently contains almost a one full bitcoin.

"Based on our telemetry, Masad Stealer’s main distribution vectors are masquerading as a legitimate tool or bundling themselves into third party tools," wrote the research organization. "Threat actors achieve end user downloads by advertising in forums, on third party download sites or on file sharing sites."

The software masquerades as useful-looking software like Tradebot_binance.exe, Galaxy Software Update.exe, and Fortniteaimbot  2019.exe. Once infected, the computer then begins communicating with the command and control Telegram channel and sends back private data.

The malware allegedly costs $40 on the dark web and is completely configurable and very dangerous, said Juniper.

"Juniper Threat Labs believes that Masad Stealer represents an active and ongoing threat.  Command and Control bots are still alive and responding as of this writing, and the malware appears to still be available for purchase on the black market," wrote the researchers.

Hacker image via Michael Geiger/Unsplash

Disclosure

Please note that our privacy policy, terms of use, cookies, and do not sell my personal information has been updated.

CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. In November 2023, CoinDesk was acquired by the Bullish group, owner of Bullish, a regulated, digital assets exchange. The Bullish group is majority-owned by Block.one; both companies have interests in a variety of blockchain and digital asset businesses and significant holdings of digital assets, including bitcoin. CoinDesk operates as an independent subsidiary with an editorial committee to protect journalistic independence. CoinDesk employees, including journalists, may receive options in the Bullish group as part of their compensation.


Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.


Read more about