A newly found clipboard hijacking operation dubbed ‘MassJacker’ uses no less than 778,531 cryptocurrency pockets addresses to steal digital property from compromised computer systems.
In accordance to CyberArk, who found the MassJacker marketing campaign, roughly 423 wallets linked to the operation contained $95,300 on the time of the evaluation, however historic knowledge suggests extra vital transactions.
Additionally, there is a single Solana pockets that the risk actors seem to use as a central money-receiving hub, which has amassed over $300,000 in transactions to this point.
CyberArk suspects that your complete MassJacker operation is related to a selected risk group, as file names downloaded from command and management servers and encryption keys used to decrypt the information had been the identical all through your complete marketing campaign.
Nonetheless, the operation might nonetheless be following a malware-as-a-service mannequin, the place a central administrator sells entry to numerous cybercriminals.

Supply: CyberArk
CyberArk calls MassJacker a cryptojacking operation, although this time period is extra typically related to unauthorized cryptocurrency mining leveraging the sufferer’s processing/{hardware} sources.
In actuality, MassJacker depends on clipboard hijacking malware (clippers), which is a kind of malware that screens Home windows clipboard for copied cryptocurrency pockets addresses and replaces them with one beneath the attacker’s management.
By doing so, victims unknowingly ship cash to the attackers, although they meant to ship it to another person.
Clippers are easy however very efficient instruments which might be notably arduous to detect due to their restricted performance and operational scope.
Technical particulars
MassJacker is distributed through pesktop[.]com, a web site that hosts pirated software program and malware.
Software program installers downloaded from this web site execute a cmd script that triggers a PowerShell script, which fetches an Amadey bot and two loader information (PackerE and PackerD1).
Amadey launches PackerE, which, in flip, decrypts and hundreds PackerD1 into reminiscence.
PackerD1 options 5 embedded sources that improve its evasion and anti-analysis efficiency, together with Simply-In-Time (JIT) hooking, metadata token mapping to obfuscate perform calls, and a customized digital machine for command interpretation as an alternative of working common .NET code.
PackerD1 decrypts and injects PackerD2, which finally decompresses and extracts the ultimate payload, MassJacker, and injects it into the legit Home windows course of ‘InstalUtil.exe.’
.jpg)
Supply: CyberArk
MassJacker screens the clipboard for cryptocurrency pockets addresses utilizing regex patterns, and if a match is discovered, it replaces it with an attacker-controlled pockets deal with from an encrypted checklist.
CyberArk calls the cybersecurity analysis neighborhood to look nearer into massive cryptojacking operations like MassJacker, as regardless of the perceived low monetary damages, they may reveal helpful identification info on many risk actors.