{"id":21278,"date":"2025-04-09T12:02:03","date_gmt":"2025-04-09T12:02:03","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=21278"},"modified":"2025-04-09T12:02:03","modified_gmt":"2025-04-09T12:02:03","slug":"fake-microsoft-office-extensions-used-to-spread-crypto-stealing-malware-kaspersky-warns","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=21278","title":{"rendered":"Fake Microsoft Office Extensions Used To Spread Crypto-Stealing Malware, Kaspersky Warns"},"content":{"rendered":"<div>\n<p><span data-preserver-spaces=\"true\">Cybersecurity firm Kaspersky has <\/span><span data-preserver-spaces=\"true\">issued a warning<\/span><span data-preserver-spaces=\"true\"> about malicious Microsoft Office extensions being used to spread malware that targets cryptocurrency users. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The malware, hidden in fake software packages uploaded to SourceForge, is designed to steal funds by altering copied crypto wallet addresses.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">In its <\/span><a class=\"editor-rtfLink\" href=\"https:\/\/securelist.com\/miner-clipbanker-sourceforge-campaign\/116088\/\" target=\"_blank\" rel=\"noopener nofollow\"><span data-preserver-spaces=\"true\">April 8 report<\/span><\/a><span data-preserver-spaces=\"true\">, Kaspersky\u2019s Anti-Malware Research Team revealed that one malicious listing, called \u201cofficepackage.\u201d It appears to contain legitimate Microsoft Office add-ins but is bundled with a program known as ClipBanker. <\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">EXPLORE:\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/99bitcoins.com\/cryptocurrency\/new-cryptocurrency\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Best New Cryptocurrencies to Invest in 2025<\/span><\/a><\/strong><\/p>\n<h2><span data-preserver-spaces=\"true\">Clipboard-Hijacking Malware Swaps Crypto Wallet Addresses To Steal Funds<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">The malware monitors a user\u2019s clipboard and, if it detects a copied crypto wallet address, replaces it with an address controlled by the attacker.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u201cUsers of crypto wallets typically copy addresses instead of typing them. If the device <\/span><span data-preserver-spaces=\"true\">is infected<\/span><span data-preserver-spaces=\"true\"> with ClipBanker, the victim\u2019s money will end up somewhere entirely unexpected,\u201d Kaspersky\u2019s team stated.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The malware campaign <\/span><span data-preserver-spaces=\"true\">is designed<\/span><span data-preserver-spaces=\"true\"> to mimic legitimate software, <\/span><span data-preserver-spaces=\"true\">complete<\/span><span data-preserver-spaces=\"true\"> with a polished page on SourceForge and fake download buttons. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The malware also collects sensitive data from infected devices\u2014such as IP addresses, countries, and usernames. These <\/span><span data-preserver-spaces=\"true\">are<\/span><span data-preserver-spaces=\"true\"> sent<\/span><span data-preserver-spaces=\"true\"> to the attackers via Telegram. Some files in the installer are suspiciously small, while others are padded with junk data to appear more convincing.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Kaspersky also found that the malware avoids detection by checking for existing antivirus software and removing itself if identified. While the malware\u2019s primary function is to steal crypto funds via mining and address swapping, the attackers may also sell access to compromised systems to more dangerous actors.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The Russian-language interface suggests the malware may be targeting Russian-speaking users specifically. Kaspersky noted that 90% of detected victims <\/span><span data-preserver-spaces=\"true\">were <\/span><span data-preserver-spaces=\"true\">based<\/span><span data-preserver-spaces=\"true\"> in Russia, with over 4,600 users affected between January and March 2025.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\"> ALERT: <\/p>\n<p>A malware disguised as Microsoft Office add-ins on SourceForge is targeting crypto users with a clipboard-hijacking technique, according to Kaspersky.<\/p>\n<p>The malware replaces copied crypto wallet addresses with the attacker&#8217;s address. <a href=\"https:\/\/twitter.com\/search?q=%24sol&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow\">$sol<\/a> <a href=\"https:\/\/twitter.com\/search?q=%24eth&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow\">$eth<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybercrime?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow\">#cybercrime<\/a> <a href=\"https:\/\/t.co\/p8rLsEbUos\" target=\"_blank\" rel=\"nofollow\">pic.twitter.com\/p8rLsEbUos<\/a><\/p>\n<p>\u2014 Tom Bibiyan <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f1fa-1f1f8.png\" alt=\"\ud83c\uddfa\ud83c\uddf8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\"> (@realtombibiyan) <a href=\"https:\/\/twitter.com\/realtombibiyan\/status\/1909874709300453521?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow\">April 9, 2025<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span data-preserver-spaces=\"true\">The company advises users to download software only from official, trusted sources, warning that pirated or alternative software versions <\/span><span data-preserver-spaces=\"true\">are often used<\/span><span data-preserver-spaces=\"true\"> as vehicles for malware. \u201cAttackers keep looking for new ways to make their websites look legit,\u201d Kaspersky noted.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Other cybersecurity firms are also flagging new malware threats. Threat Fabric recently reported a new malware family targeting Android devices by overlaying fake interfaces to trick users into revealing their crypto wallet seed phrases.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">EXPLORE:\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/99bitcoins.com\/cryptocurrency\/best-ai-crypto-coins\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">10 Best AI Crypto Coins to Invest in 2025<\/span><\/a><\/strong><\/p>\n<h2><span data-preserver-spaces=\"true\">Crypto Hacks Top $1.6B In Q1 2025, With Bybit Exploit Driving Bulk Of Losses<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Over $1.63 billion in cryptocurrency <\/span><span data-preserver-spaces=\"true\">was stolen<\/span><span data-preserver-spaces=\"true\"> during the first quarter of 2025, with a staggering 92% of the total attributed to the massive Bybit hack in February, according to blockchain security firm PeckShield. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\">While January recorded $87 million in losses, February saw an unprecedented surge to $1.53 billion, including additional attacks on Infini, <\/span><span data-preserver-spaces=\"true\">zkLend<\/span><span data-preserver-spaces=\"true\">, and Ionic.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">However, March brought some relief, with hack-related losses dropping sharply to $33 million \u2014 a 97% decline from February. Some stolen funds <\/span><span data-preserver-spaces=\"true\">were <\/span><span data-preserver-spaces=\"true\">also<\/span><span data-preserver-spaces=\"true\"> recovered<\/span><span data-preserver-spaces=\"true\">, offering a partial reprieve for affected users and platforms.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">DISCOVER:\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/99bitcoins.com\/cryptocurrency\/best-meme-coin-icos\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Best Meme Coin ICOs to Invest in April 2025<\/span><\/a><\/strong><\/p>\n<p><strong><a class=\"editor-rtfLink\" href=\"https:\/\/discord.gg\/B7Uk6agkqj\" target=\"_blank\" rel=\"noopener nofollow\"><span data-preserver-spaces=\"true\">Join The 99Bitcoins News Discord Here For The Latest Market Updates<\/span><\/a><\/strong><\/p>\n<div class=\"nnbtc-key-takeaways\">\n<h3 class=\"nnbtc-key-takeaways__title\">Key Takeaways<\/h3>\n<ul class=\"nnbtc-key-takeaways__list\">\n<li class=\"nnbtc-key-takeaways__list-item\">\n        <span data-preserver-spaces=\"true\">Kaspersky warns of malware hidden in fake Microsoft Office add-ins designed to steal crypto by hijacking copied wallet addresses.<\/span>    <\/li>\n<li class=\"nnbtc-key-takeaways__list-item\">\n        <span data-preserver-spaces=\"true\">The malware, dubbed ClipBanker, also collects user data and evades detection by removing itself if antivirus software <\/span><span data-preserver-spaces=\"true\">is found<\/span><span data-preserver-spaces=\"true\">.<\/span>    <\/li>\n<li class=\"nnbtc-key-takeaways__list-item\">\n        <span data-preserver-spaces=\"true\">Over 90% of victims were Russian users, prompting Kaspersky to urge downloads only from official and trusted software sources.<\/span>    <\/li>\n<\/ul><\/div>\n<p>The post <a href=\"https:\/\/99bitcoins.com\/news\/fake-microsoft-office-extensions-used-to-spread-crypto-stealing-malware-kaspersky-warns\/\">Fake Microsoft Office Extensions Used To Spread Crypto-Stealing Malware, Kaspersky Warns<\/a> appeared first on <a href=\"https:\/\/99bitcoins.com\/\">99Bitcoins<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity firm Kaspersky has issued a warning about malicious Microsoft Office extensions being used to spread malware that targets cryptocurrency users. The malware, hidden in fake software packages uploaded to SourceForge, is designed to steal funds by altering copied crypto wallet addresses. In its April 8 report, Kaspersky\u2019s Anti-Malware Research Team revealed that one malicious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-21278","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/21278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21278"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/21278\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}