Hackers Use Clipboard Stealers To Steal From Other Hackers

Share post:

Security researchers from Cyble and ASEC have uncovered a new campaign of hackers targeting fellow hackers via clipboard stealers. These stealers are disguised as cracked RATs and malware building tools.

Generally, clipboard stealers are used in monitoring the clipboard content of a victim, identifying cryptocurrency wallet addresses, hijacking financial transactions, and transferring money.

ASEC researchers detected the fake offers on hacking forums such as “Russia black hat.” Hackers are deceived into installing cracked versions of BitRAT and Quasar RAT.

To download the tool, hackers are directed to an Anonfiles page that delivers a RAR archive. This is supposedly a builder for the selected malware.

However, the “crack.exe” file contained in these archives is a ClipBanker installer that copies the malicious binary to the startup folder and executes it on the first reboot.

Cyble researchers found hackers offering a free month of AvD Crypto Stealer on a cybercrime forum. The victims are deceived into downloading an executable named ‘Payload.exe’ which ends up infecting their systems.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs


Related articles

Cyber Security Today, Week in Review for Friday, December 1, 2023

This episode features a discussion on ransomware, the latest explanation from Okta of a support hack and a survey of infosec pros whose firms w

Cyber Security Today, Dec. 1, 2023 podcast – More on Booking.com compromises

This episode reports on the sanctioning of the Sinbad crypto mixe

All Okta customer support users had their email addresses copied

Identity and access provider Okta now says the threat actor who accessed its customer help desk system last month got the names and email addresses of all contacts of organizations that use its support system. Originally, the company said that, after an investigation, it determined only one per cent of the contacts from its 18,000

Failure of technology to detect attacks is a prime cause of breaches: Survey

Despite the money being poured into cybersecurity by IT departments, the leading cause of breaches of security controls was the failure of technology to detect an attack, a new survey from Trellix suggests. Forty-two per cent of respondents to the international survey of infosec leaders whose organization had suffered a recent cyber attack said their

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways