Bitcoin Forum
May 01, 2024, 11:37:00 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: What are the methods used to attack cryptocurrencies through the clipboard?  (Read 115 times)
sintone (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
April 12, 2024, 08:03:00 AM
 #1

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?
1714563420
Hero Member
*
Offline Offline

Posts: 1714563420

View Profile Personal Message (Offline)

Ignore
1714563420
Reply with quote  #2

1714563420
Report to moderator
1714563420
Hero Member
*
Offline Offline

Posts: 1714563420

View Profile Personal Message (Offline)

Ignore
1714563420
Reply with quote  #2

1714563420
Report to moderator
1714563420
Hero Member
*
Offline Offline

Posts: 1714563420

View Profile Personal Message (Offline)

Ignore
1714563420
Reply with quote  #2

1714563420
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714563420
Hero Member
*
Offline Offline

Posts: 1714563420

View Profile Personal Message (Offline)

Ignore
1714563420
Reply with quote  #2

1714563420
Report to moderator
1714563420
Hero Member
*
Offline Offline

Posts: 1714563420

View Profile Personal Message (Offline)

Ignore
1714563420
Reply with quote  #2

1714563420
Report to moderator
Charles-Tim
Legendary
*
Offline Offline

Activity: 1526
Merit: 4833



View Profile
April 12, 2024, 08:09:01 AM
 #2

The attacker malware gain access to the clipboard of his victims device. The malware change the bitcoin address that the victim copied. It changed it to the attackers bitcoin address. So if the victim paste what is copied to the clipboard, it will be the attackers address and not the address that he copied.

If the victim wants to send his address to someone to send him some coins, it will be the attackers address that would be sent.
If the victim wants to send bitcoin to someone, he will unknowingly send the coins to the attackers address.

That is why it is good to check and recheck the address that you are sending coins to
That is why it is good to avoid malware
Cold wallets are safer
Using QR code is effective as it does not make use of clipboard but camera.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
sintone (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
April 12, 2024, 08:16:46 AM
 #3

The attacker malware gain access to the clipboard of his victims device. The malware change the bitcoin address that the victim copied. It changed it to the attackers bitcoin address. So if the victim paste what is copied to the clipboard, it will be the attackers address and not the address that he copied.

If the victim wants to send his address to someone to send him some coins, it will be the attackers address that would be sent.
If the victim wants to send bitcoin to someone, he will unknowingly send the coins to the attackers address.

That is why it is good to check and recheck the address that you are sending coins to.
That is why it is good to avoid malware
Cold wallets are safer
Using QR code is effective as it does not make use of clipboard but camera.

Thanks Charles,

BTC addresses are difficult to identify with the naked eye, so many people do not bother to double-check visually, which can easily lead to errors.
Abbatty
Member
**
Offline Offline

Activity: 129
Merit: 56


View Profile
April 12, 2024, 09:00:31 AM
 #4

I have been away for sometime but didn’t stop me from studying and learning about crypto, I don’t know much about this but with my little knowledge on bitcoin and cryptocurrency i’d like to share my little knowledge.

I think keyboard can be attack by the Two major ways:

1. Spoofing
2. Sweeping

1. Spoofing:
 This method involves hiding or disguising identity to enable malicious activity. i.e spoofing the identity of the malicious party to make it believable and to also appear trustworthy. This method also applies to calls, emails websites and even IP addresses.
They act like they impersonate information from a known source example is like they can create an email like it from your bank and you can easily fall victim to it

2. Sweeping:

The sweeping method is very tricky, in this method what they do is they monitor your transactions so when you copy a wallet address they intercept it and assign there own wallet address which look very similar to yours, without proper Check you a definitely falling a victim, so when you send funds or coins it will be there address you send it to.

For further explanation and understanding you can read the link.
https://consensys.io/blog/spoofing-sweepers-and-clipboard-hacks-how-to-stay-safe-from-scams
Z-tight
Hero Member
*****
Online Online

Activity: 840
Merit: 1031


Only BTC


View Profile
April 12, 2024, 05:16:03 PM
 #5

BTC addresses are difficult to identify with the naked eye, so many people do not bother to double-check visually, which can easily lead to errors.
It is not too difficult to double-check BTC addresses, some people are used to checking the first and last 3-6 characters, but that in itself is not enough, and an attacker can generate a vanity address that is very similar to your address and that will deceive you. Double-check all the characters in your address before sending funds, if you want to be sure.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Yamane_Keto
Sr. Member
****
Offline Offline

Activity: 462
Merit: 486



View Profile WWW
April 13, 2024, 01:39:18 PM
 #6

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?
The solution you suggest is that instead of copying the data using clipboard manager, you created an alternative to the system clipboard, which may protect the user, but hackers can check system file, and if it is found that SecureClipX was downloaded, will change the file extension to the link in which you copy the dat.

The best solution for such viruses is not to download random applications and to check the Bitcoin address several times, but the Clipboard V2 application is a temporary solution unless you have a code that guarantees that pasting will be exactly the same as copying ( a HASH function as example.)

.BEST.CHANGE..███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
SickDayIn
Jr. Member
*
Offline Offline

Activity: 42
Merit: 12


View Profile
April 13, 2024, 02:06:07 PM
 #7

Whilst i am sure your project has god intentions to safeguard users clipboards when copying and pasting cryptocurrency addresses, I think it's important to acknowledge that a supply chain attack on your company and software could be a lucrative target for hackers as they could compromise your software and enforce the pasting of a malicious cryptocurrency address to hijack funds..it will be important to make some commitments to security and get some kind of security code audits or attestation to give customers confidence.
un_rank
Hero Member
*****
Offline Offline

Activity: 700
Merit: 680


- Jay -


View Profile WWW
April 13, 2024, 04:01:58 PM
 #8

The best current solutions I see employed to prevent clipboard attacks is sensitive applications having a virtual keyboard in their system. This protects the user even if a hacker has access to the device default keyboard. Users should not download randome keyboards no matter how fancy they look cause that is the top way hackers gain access. If you muct download, find an open source software to use after doing your research on it.

- Jay -

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7430


Crypto Swap Exchange


View Profile
April 14, 2024, 10:13:33 AM
 #9

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?

Have you tried researching common way to track or modify clipboard of Mac OS? Here's an example from quick google search.

On a macOS system, there are two commands that can be used to extract clipboard data, osascript, and pbpaste. This technique is quite well-known and documented at this point and is built into popular exploitation frameworks such as the EmpireProject’s EmPyre, a Python-based exploitation framework which works with macOS.

https://apple.stackexchange.com/a/281399 also provide many resource about clipboard on Mac OS. I don't think most member can provide details which aren't mentioned on those link i mentioned.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!