First CryptoCurrency Clipboard Hijacker Found on Google Play Store

- Advertisement -

Researchers last week found the first Android app on the Google Play store that monitors a device’s clipboard for Bitcoin and Ethereum addresses and swaps them for addresses under the attacker’s control. This allows the attackers to steal any payments you make without your knowledge that you sent it to the wrong address.

A malicious Android app called MetaMask was added to the Google Play store that pretended to be a mobile version of the legitimate service of the same name.  This app, though, was detected by ESET as malicious and when ESET Android security researcher Lukas Stefanko performed an analysis, it was discovered to be stealing a user’s cryptocurrency using two different attack methods.

The first attack method the app used was to attempt to steal the private keys and seeds of an Ethereum wallet when a user adds it to the app. When BleepingComputer analyzed the app’s APK file, we found that the app contains information that can be used to send this stolen data to a Telegram account.

- Advertisement -
Telegram Message Info
Telegram Message Info

Once a private key is entered, the app will combine the above information information along with the stolen private key and send it via Telegram to the attackers.  Stefanko confirmed that the attackers were using Telegram to receive the stolen keys and seeds.

Sending the stolen key via Telegram
Sending the stolen key via Telegram

The second attack method discovered by Stefanko was to monitor the device’s clipboard for Ethereum and Bitcoin addresses, and if one is detected, swap it out with a different address under the attacker’s control. As cryptocurrency addresses are composed of a long string of numbers and characters, it is hard to memorize them. Knowing this, attackers can swap a desired address with one under their control and have little chance of being detected.

Swapping Bitcoin and Ethereum addresses in clipboard
Swapping Bitcoin and Ethereum addresses in clipboard

When replacing addresses in the clipboard, the program will swap out a Bitcoin address with 17M66AG2uQ5YZLFEMKGpzbzh4F1EsFWkmA and an Ethereum address with 0xfbbb2EF692B5101f16d3632f836461904C761965.

Clipboard monitoring is not new and this attack method has been seen it numerous times already in Windows malware, browser extensions, and being sold on underground markets for Android. This is the first time, according to Stefanko, that one was detected on the Google Play store.

Thankfully, this particular app was not widespread and only had five installs. Stefanko told BleepingComputer that this was most likely because it was detected and reported only a few days after being uploaded to the Google Play store.



Previous Articles:

- Advertisement -

Latest News

Solana ETF Approval Seen as Imminent After S-1 Amendment Filing

The U.S. Securities and Exchange Commission (SEC) has made the 19b-4 review timeline irrelevant...

Wisconsin Bill Proposes Crypto Mining, Staking License Exemptions

Wisconsin lawmakers propose a bill to exempt individuals and businesses from money transmitter licenses...

Dormant Bitcoin Whale Moves $44M After 12 Years, Spooking Market

An inactive Bitcoin wallet holding 400 BTC, valued at over $44 million, moved funds...

Nvidia Stock Jumps as $100B OpenAI Investment Talks Fuel Optimism

NVIDIA stock rose 2% after recent losses, as several other AI-related stocks also saw...

Turkey Plans Law Allowing Watchdog to Freeze Crypto Accounts

Turkey plans to give its financial watchdog, Masak, power to freeze both bank and...
- Advertisement -

Must Read

Top 9 Most Legit Bitcoin Faucets

Bitcoin faucets are platforms where you can earn Bitcoin free. Some other faucet apps and websites allow users to receive different cryptocurrencies for free....