Close Menu
News World AiNews World Ai

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Renault CEO Luca de Meo Suddenly Resigns

    How to Buy Treasury Bills: A Beginner’s Guide

    Discover How AI Can Transform the Way You Work With This $20 E-Degree

    Facebook X (Twitter) Instagram
    News World AiNews World Ai
    • Entertainment
    • Gaming
    • Pet Care
    • Travel
    • Home
    • Automotive
    • Home DIY
    • Tech
      • Crypto & Blockchain
      • Software Reviews
      • Tech & Gadgets
    • Lifestyle
      • Fashion & Beauty
      • Mental Wellness
      • Luxury Living
    • Health & Fitness
    Facebook X (Twitter) Instagram
    • Home
    • Finance
    • Personal Finance
    • Make Money Online
    • Digital Marketing
    • Real Estate
    • Entrepreneurship
    • Insurance
      • Crypto & Blockchain
      • Software Reviews
      • Legal Advice
      • Gadgets
    News World AiNews World Ai
    You are at:Home»Tech»Crypto & Blockchain»Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
    Crypto & Blockchain

    Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles

    newsworldaiBy newsworldaiApril 9, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    According to CyberScript firm Casparesky, malicious actors are trying to steal crypto with malware embedded in fake Microsoft Office extensions uploaded on Source Hosting Site Source.

    https://www.tiqets.com/en/new-york-new-york-hotel-casino-tickets-l235895/?partner=travelpayouts.com&tq_campaign=bc55a31e7f434e4ab93246c49-615741

    Clip Banker hides a malware that is a malicious list called the “office package”, but it hides a malaware called Clip Banker, which takes the copied crypto wallet address on a computer clipboard from the attacker’s address.

    The team said, “Crypto wallet users usually copy the leaves instead of typing them. If the device is affected by the clip banker, the victim’s money will be eliminated somewhere unexpectedly.”

    The fake project page on the Sourceforj imitates a legitimate developer tool page, showing office aid and download buttons and may also appear in search results.

    Kaspersky said it received a crypto -stolen malware on the software hosting website Sourcefurge. Source: Caspersky

    Another feature of malware infection China includes infected device information such as IP addresses, country and username hackers by telegram, Kaspersky said.

    The malware infectious system can also scan for symbols that have been installed before or for anti -virus software and can delete themselves.

    Invaders can sell access to the system to others

    Caspersky says some files in the bogus download are small, which “raise red flags, because office requests are never so small, even when compressed.”

    Other files are spoken with a junk to persuade users to look at a real software installer.

    The firm said the attackers accessed the affected system “through numerous ways, including unconventional ways.”

    “Although the attack primarily targets cryptocurrency by deploying a miner and clip banker, the attackers can sell access to the system to more dangerous actors.”

    The interface is in the Russian language, which Caspersky speculation may mean that it targets Russian -speaking users.