Bitcoin Forum
November 07, 2024, 09:47:42 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: What are the methods used to attack cryptocurrencies through the clipboard?  (Read 134 times)
sintone (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
April 12, 2024, 08:03:00 AM
 #1

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?
Charles-Tim
Legendary
*
Offline Offline

Activity: 1722
Merit: 5198


Leading Crypto Sports Betting & Casino Platform


View Profile
April 12, 2024, 08:09:01 AM
 #2

The attacker malware gain access to the clipboard of his victims device. The malware change the bitcoin address that the victim copied. It changed it to the attackers bitcoin address. So if the victim paste what is copied to the clipboard, it will be the attackers address and not the address that he copied.

If the victim wants to send his address to someone to send him some coins, it will be the attackers address that would be sent.
If the victim wants to send bitcoin to someone, he will unknowingly send the coins to the attackers address.

That is why it is good to check and recheck the address that you are sending coins to
That is why it is good to avoid malware
Cold wallets are safer
Using QR code is effective as it does not make use of clipboard but camera.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
sintone (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
April 12, 2024, 08:16:46 AM
 #3

The attacker malware gain access to the clipboard of his victims device. The malware change the bitcoin address that the victim copied. It changed it to the attackers bitcoin address. So if the victim paste what is copied to the clipboard, it will be the attackers address and not the address that he copied.

If the victim wants to send his address to someone to send him some coins, it will be the attackers address that would be sent.
If the victim wants to send bitcoin to someone, he will unknowingly send the coins to the attackers address.

That is why it is good to check and recheck the address that you are sending coins to.
That is why it is good to avoid malware
Cold wallets are safer
Using QR code is effective as it does not make use of clipboard but camera.

Thanks Charles,

BTC addresses are difficult to identify with the naked eye, so many people do not bother to double-check visually, which can easily lead to errors.
Abbatty
Full Member
***
Offline Offline

Activity: 400
Merit: 164



View Profile
April 12, 2024, 09:00:31 AM
 #4

I have been away for sometime but didn’t stop me from studying and learning about crypto, I don’t know much about this but with my little knowledge on bitcoin and cryptocurrency i’d like to share my little knowledge.

I think keyboard can be attack by the Two major ways:

1. Spoofing
2. Sweeping

1. Spoofing:
 This method involves hiding or disguising identity to enable malicious activity. i.e spoofing the identity of the malicious party to make it believable and to also appear trustworthy. This method also applies to calls, emails websites and even IP addresses.
They act like they impersonate information from a known source example is like they can create an email like it from your bank and you can easily fall victim to it

2. Sweeping:

The sweeping method is very tricky, in this method what they do is they monitor your transactions so when you copy a wallet address they intercept it and assign there own wallet address which look very similar to yours, without proper Check you a definitely falling a victim, so when you send funds or coins it will be there address you send it to.

For further explanation and understanding you can read the link.
https://consensys.io/blog/spoofing-sweepers-and-clipboard-hacks-how-to-stay-safe-from-scams

Z-tight
Legendary
*
Offline Offline

Activity: 1036
Merit: 1106



View Profile
April 12, 2024, 05:16:03 PM
 #5

BTC addresses are difficult to identify with the naked eye, so many people do not bother to double-check visually, which can easily lead to errors.
It is not too difficult to double-check BTC addresses, some people are used to checking the first and last 3-6 characters, but that in itself is not enough, and an attacker can generate a vanity address that is very similar to your address and that will deceive you. Double-check all the characters in your address before sending funds, if you want to be sure.

Yamane_Keto
Hero Member
*****
Offline Offline

Activity: 616
Merit: 510



View Profile WWW
April 13, 2024, 01:39:18 PM
 #6

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?
The solution you suggest is that instead of copying the data using clipboard manager, you created an alternative to the system clipboard, which may protect the user, but hackers can check system file, and if it is found that SecureClipX was downloaded, will change the file extension to the link in which you copy the dat.

The best solution for such viruses is not to download random applications and to check the Bitcoin address several times, but the Clipboard V2 application is a temporary solution unless you have a code that guarantees that pasting will be exactly the same as copying ( a HASH function as example.)

えいごをはなせますか。
SickDayIn
Member
**
Offline Offline

Activity: 210
Merit: 31


View Profile
April 13, 2024, 02:06:07 PM
 #7

Whilst i am sure your project has god intentions to safeguard users clipboards when copying and pasting cryptocurrency addresses, I think it's important to acknowledge that a supply chain attack on your company and software could be a lucrative target for hackers as they could compromise your software and enforce the pasting of a malicious cryptocurrency address to hijack funds..it will be important to make some commitments to security and get some kind of security code audits or attestation to give customers confidence.
un_rank
Hero Member
*****
Offline Offline

Activity: 896
Merit: 856


- Jay -


View Profile WWW
April 13, 2024, 04:01:58 PM
 #8

The best current solutions I see employed to prevent clipboard attacks is sensitive applications having a virtual keyboard in their system. This protects the user even if a hacker has access to the device default keyboard. Users should not download randome keyboards no matter how fancy they look cause that is the top way hackers gain access. If you muct download, find an open source software to use after doing your research on it.

- Jay -

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
ABCbits
Legendary
*
Offline Offline

Activity: 3052
Merit: 8064


Crypto Swap Exchange


View Profile
April 14, 2024, 10:13:33 AM
 #9

Hello everyone, I am a macOS software developer. I am currently developing an open-source software to safeguard users' clipboards (https://secureclipx.cleanclip.cc), aiming to protect users' assets from the influence of malicious software.

I am currently gathering information on attack methods used by malicious software through the clipboard to enhance the capabilities of my software.

Could you please provide any existing attack methods related to the clipboard?

Have you tried researching common way to track or modify clipboard of Mac OS? Here's an example from quick google search.

On a macOS system, there are two commands that can be used to extract clipboard data, osascript, and pbpaste. This technique is quite well-known and documented at this point and is built into popular exploitation frameworks such as the EmpireProject’s EmPyre, a Python-based exploitation framework which works with macOS.

https://apple.stackexchange.com/a/281399 also provide many resource about clipboard on Mac OS. I don't think most member can provide details which aren't mentioned on those link i mentioned.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!