Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
MassJacker malware hijacks 750K wallets in $300K crypto heist

MassJacker malware hijacks 750K wallets in $300K crypto heist

GrafaGrafa2025/03/17 07:30
By:Mahathir Bayena

A new malware campaign called MassJacker has been targeting users downloading pirated software, hijacking cryptocurrency transactions by modifying clipboard data.

Cybersecurity firm CyberArk discovered that the malware has compromised more than 778,531 wallets, siphoning at least $336,700 since 2022.

The attack originates from pesktop[.]com, a site distributing pirated software embedded with malicious scripts.

Once executed, these scripts download payloads like the Amadey botnet and PackerE malware, ultimately deploying the MassJacker clipper.

The malware monitors clipboard activity and replaces copied cryptocurrency addresses with attacker-controlled wallets.

MassJacker uses advanced obfuscation techniques to evade detection, including JIT Hooking to modify code dynamically and infinite anti-debugging loops.

CyberArk researchers decrypted historical command-and-control (C2) data, uncovering reused encryption keys across multiple campaigns.

"We recovered 778,531 unique addresses by decrypting older files," CyberArk noted.

While only 423 wallets contained funds during analysis, one Solana wallet held over $87,000 in SOL and NFTs.

The transaction history indicated swaps involving tokens such as Jupiter (CRYPTO:JUP) and Uniswap (CRYPTO:UNI), suggesting a diversified strategy by attackers.

MassJacker’s stealth makes detection difficult, as its malicious activity only triggers when users copy wallet addresses.

Unlike ransomware, clipper malware relies on specific user interactions, allowing it to evade sandbox testing.

CyberArk linked MassJacker’s code structure to the credential-stealing MassLogger malware, emphasising that threat actors are expanding their toolsets.

Despite its sophistication, MassJacker’s profitability remains volatile.

Over 35 antivirus engines flagged components as malicious but failed to identify its cryptojacking nature.

The campaign highlights the increasing risks of pirated content, with attackers also leveraging fake job scams and software cracks to distribute malware.

As cryptocurrency adoption grows, analysts warn that these threats will persist.

"Cryptojackers aren’t as profitable as ransomware, but their low profile makes them a persistent menace," CyberArk concluded.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like