Loading cryptocurrency prices...

Printer Driver Hijack Steals Nearly $1M in Bitcoin, MistTrack Warns

Printer Vulnerability Exposes Cryptocurrency Wallets to New Security Threat

  • A backdoor in an official printer driver is being used to steal cryptocurrency from users’ wallets.
  • The exploit replaces crypto wallet addresses copied to a user’s clipboard with the attacker’s address.
  • At least 9.3 Bitcoin, valued at about $989,000, has been stolen using this method.
  • The attacker’s wallet has been active since 2016 and is linked to multiple crypto exchanges.
  • This attack is similar to past clipboard-hijacking Malware incidents, but spreads via legitimate-looking software drivers.

MistTrack, a blockchain security platform, recently announced that a malicious exploit is targeting crypto users by embedding a backdoor into a printer driver. The exploit, discovered by the Cybersecurity arm of SlowMist, allows the attacker to intercept and alter cryptocurrency wallet addresses stored in a user’s clipboard.

- Advertisement -

According to on-chain data from MistTrack, the attacker has collected a minimum of 9.3 Bitcoin, worth around $989,000, from victims’ crypto transactions. The suspect’s wallet has sent and received funds from numerous on-chain addresses, and has been linked to several crypto exchanges.

The official printer driver identified in this attack installs a backdoor program once loaded onto a device. “The official driver provided by this printer carries a backdoor program. It will hijack the wallet address in the user’s clipboard and replace it with the attacker’s address,” stated MistTrack in a recent post.

The malware works by monitoring the clipboard, which temporarily stores data a user copies. When a user copies a crypto wallet address, the malware replaces it with the attacker’s address. If the change goes unnoticed, funds are unintentionally sent to the attacker’s wallet.

A similar technique surfaced in March 2025 with malware called MassJacker, according to CyberArk. MassJacker allegedly used hundreds of thousands of unique addresses and spread through pirated or cracked software from unofficial sources. However, the current printer driver exploit relies on a recurring wallet address and is distributed through legitimate-seeming software.

- Advertisement -

On-chain activity shows the main attacker’s wallet address has been operational since April 2016. The last detected transaction before the recent thefts was on March 14, 2024. The wallet has connections to several crypto exchanges, potentially complicating tracing efforts.

Cybersecurity experts advise crypto users to only install drivers and applications from verified, official sources to reduce exposure to these types of clipboard-hijacking threats.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Fear Fuels Potential for Unexpected November Rally

Crypto market sentiment is showing extreme fear, the lowest since March, amid ongoing declines....

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...
- Advertisement -

Must Read

10 Best Crypto Audiobooks You Don’t Want to Miss

So, you are getting tired of reading books and you want to switch to audiobooks that talk about cryptocurrencies. Well, today we are going...