Partager:

JAKARTA - Some time ago Kaspersky researchers had discovered a campaign to steal crypto assets distributed under the guise of the Tor (Tor Browser) browser.

This malware operates by replacing some of the inserted content with the attacker's wallet address (wallet address) after detecting the wallet address on the clipboard.

Kaspersky security experts also found there were more than 15,000 detected attacks, and these malware clipboard injectors targeted crypto assets such as Bitcoin, Ethereum, Litecoin, Dogecoin, and Monero.

"Despite the fundamental simplicity of the fake Tor browser attack, it poses a much greater danger than it can be seen. Not only does it make the money transfer process irreversible, but it is also passive and difficult to detect for ordinary users," said Vitaly Kamluk, Head of the Asia Pacific Unit, Research Team & Global Analysis (GREAT).

According to Kamluk, most malware requires communication channels between malware operators and systems in victims. Clipboard injectors can remain silent for years, without network activity or other signs of presence until the day they change the crypto wallet address.

To keep your crypto assets safe, Kaspersky experts also advise users:


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)