Hackers Use Clipboard Stealers To Steal From Other Hackers

Share post:

Security researchers from Cyble and ASEC have uncovered a new campaign of hackers targeting fellow hackers via clipboard stealers. These stealers are disguised as cracked RATs and malware building tools.

Generally, clipboard stealers are used in monitoring the clipboard content of a victim, identifying cryptocurrency wallet addresses, hijacking financial transactions, and transferring money.

ASEC researchers detected the fake offers on hacking forums such as “Russia black hat.” Hackers are deceived into installing cracked versions of BitRAT and Quasar RAT.

To download the tool, hackers are directed to an Anonfiles page that delivers a RAR archive. This is supposedly a builder for the selected malware.

However, the “crack.exe” file contained in these archives is a ClipBanker installer that copies the malicious binary to the startup folder and executes it on the first reboot.

Cyble researchers found hackers offering a free month of AvD Crypto Stealer on a cybercrime forum. The victims are deceived into downloading an executable named ‘Payload.exe’ which ends up infecting their systems.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways