• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Combojack Trojan Threatens All Cryptocurrency Addresses Saved on Windows Clipboard

March 6, 2018Simeon Georgiev

Security researchers that have a keen eye on ransomwares and malwares have recently discovered another new malware strain that has the abilities to detect when users copy addresses from a cryptocurrency account to their Windows clipboard. The malware not only detects the activity, but dupes it by replacing the specified address with that of its author.

The malware, which is currently named as ComboJack, is really similar to previous malwares like CryptoShuffler and Evrial. The difference between malwares of this nature from the past and ComboJack is that ComboJack supports all forms of cryptocurrencies and not just Bitcoin like the other malwares.

Combojack’s Targets

According to the famous Palo Alto Nwtorks, ComboJack has the ability to detect just when a user copies a cryptocurrency address not just from major crypto’s such as Bitcoin, Ethereum, Litecoin and Monero, but also from many other payment systems such as Yandex Money, Qiwi and WebMoney.

ComboJack is believed to be in active distribution as per the Palo Alto Networks. The company has mentioned that it recently detected the malware as a campaign that was targeting American and Japanese users.

Multi-Step Infection Chain

The exploitation chain for ComboJack is quite complex and hard to comprehend, but it follows the patterns that were seen last year with the Locky (Ransomware) and Dridex (banking Trojan) campaigns.

Crooks running the malware send an email to victims; which contains a scan from a lost passport. The file that is attached with this email is in a PDF format. If users download this PDF file from their email and open it, they will get an RTF file that is host to an embedded HTA object that exploits your DirectX vulnerability. On successful exploitation, this HTA file you’ve just opened runs PowerShell commands that are managed in the form of a series and execute a SFX. ComboJack is then installed when these SFX files are downloaded and run a password-protected SFX for the installation process to start.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Millions Worth of Bitcoin Stolen from Company by its Own Employee! Next post Virus Exploits All Cash Registers at Tim Hortons Franchisees

Related Articles

Japanese Teen Detained for Stealing Cryptocurrency Private Keys

February 2, 2018Simeon Georgiev

Banking Trojan said to be found in more than 40 low-cost Android models

March 3, 2018Simeon Georgiev
Banking Trojan said to be found in more than 40 low-cost Android models

More than 34,000 vulnerable Ethereum smart contracts detected in new research

March 6, 2018Simeon Georgiev
More than 34,000 vulnerable Ethereum smart contracts detected in new research

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.