~snip~
The source or how the malware spreads are not listed on the tweet. Generally, without a doubt, this kind of malware is coming from illegitimate or unofficial sources, regardless of any OS. So it is essential to use non-cracked/pirated software and make sure to download it from legitimate sources. They also might use either or a combination of social engineering and phishing.
A protective measure from any antivirus or OS securities can be bypassed, as initially happened with the malware, so the user itself is the last defence.
That's true... My last PC, which I dumped and started using a newer one, was infected by a virus. If I had not been careful enough, I could have been a victim of the clipboard virus. This was as a result of buying the so-called pirated Windows from a third party, thinking I had a shortcut and cheaper software.
I learned my lessons from that, and I believe making their way into an original OS is the best way for any hacker to completely gain access to an entire system with all specific directives on what their exact targets are.
Apart from this pirated OS from third parties, I believe there are also possible ways for hackers to penetrate, provided that one is still making use of the internet with that computer. Those dark developers are getting smarter day by day; one just needs to be extremely careful at all times.
It's because of all these messes is why I prefer using my Android smartphone to keep a small amount of crypto and store the rest on a hardware wallet, computers are too risky for crypto wallet.
Even mobile phones can be penetrated, so you are not completely safe; we just have to apply some preventive measures irrespective of which gadget we choose to use. Hardware wallets are always highly recommended as the safest, but they're not completely free from being penetrated as long as you are connecting them to a device with an internet connection. You also need to be careful about the kind of device you use them on.