Printer Driver Hijack Steals Nearly $1M in Bitcoin, MistTrack Warns

Printer Vulnerability Exposes Cryptocurrency Wallets to New Security Threat

  • A backdoor in an official printer driver is being used to steal cryptocurrency from users’ wallets.
  • The exploit replaces crypto wallet addresses copied to a user’s clipboard with the attacker’s address.
  • At least 9.3 Bitcoin, valued at about $989,000, has been stolen using this method.
  • The attacker’s wallet has been active since 2016 and is linked to multiple crypto exchanges.
  • This attack is similar to past clipboard-hijacking Malware incidents, but spreads via legitimate-looking software drivers.

MistTrack, a blockchain security platform, recently announced that a malicious exploit is targeting crypto users by embedding a backdoor into a printer driver. The exploit, discovered by the Cybersecurity arm of SlowMist, allows the attacker to intercept and alter cryptocurrency wallet addresses stored in a user’s clipboard.

- Advertisement -

According to on-chain data from MistTrack, the attacker has collected a minimum of 9.3 Bitcoin, worth around $989,000, from victims’ crypto transactions. The suspect’s wallet has sent and received funds from numerous on-chain addresses, and has been linked to several crypto exchanges.

The official printer driver identified in this attack installs a backdoor program once loaded onto a device. “The official driver provided by this printer carries a backdoor program. It will hijack the wallet address in the user’s clipboard and replace it with the attacker’s address,” stated MistTrack in a recent post.

The malware works by monitoring the clipboard, which temporarily stores data a user copies. When a user copies a crypto wallet address, the malware replaces it with the attacker’s address. If the change goes unnoticed, funds are unintentionally sent to the attacker’s wallet.

A similar technique surfaced in March 2025 with malware called MassJacker, according to CyberArk. MassJacker allegedly used hundreds of thousands of unique addresses and spread through pirated or cracked software from unofficial sources. However, the current printer driver exploit relies on a recurring wallet address and is distributed through legitimate-seeming software.

On-chain activity shows the main attacker’s wallet address has been operational since April 2016. The last detected transaction before the recent thefts was on March 14, 2024. The wallet has connections to several crypto exchanges, potentially complicating tracing efforts.

Cybersecurity experts advise crypto users to only install drivers and applications from verified, official sources to reduce exposure to these types of clipboard-hijacking threats.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest

$90M Wiped From Iran’s Nobitex Exchange in Major Political Hack

Hackers linked to Israel reportedly drained more than $90 million from Nobitex, Iran's top cryptocurrency exchange.The group, called Gonjeshke Darande or "Predatory Sparrow," claimed...

Senate Passes GENIUS Act, Advancing Stablecoin Bill to House Vote

The U.S. Senate has passed comprehensive stablecoin legislation, moving it to the House for consideration. The legislation, known as the Guiding and Establishing National Innovation...

Crypto Scandals: Experts Say Human Misconduct, Not Tech, Drives Fraud

Blockchain-related scandals often stem from familiar types of fraud, not technology itself.Technical knowledge enables new forms of crimes in crypto, such as exploiting blockchain...

South Korea Revises Stablecoin Bill, Expands Bank of Korea Role

South Korea’s Democratic Party introduced new digital asset legislation to refine stablecoin oversight.The Financial Services Commission keeps main supervision but must now consider the...

Hackers Drain $90M From Iran’s Nobitex in Politically Driven Heist

Hackers linked to Israel stole over $90 million from Iran's largest cryptocurrency exchange, Nobitex.The group behind the attack, Gonjeshke Darande, shared the exchange’s source...

Must Read

9 DePIN Programs For Passive Income

Here’s something most people don’t realize: your smartphone and PC can generate passive income with almost no effort.I’m not talking about clicking ads for...