October 1, 2019 By Shane Schick 2 min read

A malware strain dubbed Masad Stealer is using the Telegram messaging app to steal cryptocurrency by accessing browser passwords and clipboard information, security researchers learned.

As detailed in a blog post from Juniper Labs, the malware can allow cybercriminals to replace clipboard information with addresses they control, using Telegram to exfiltrate the information. This process lets attackers access wallets containing Monero, Ether, bitcoin and other forms of cryptocurrency.

The investigation highlighted one instance in which an address that was swapped using Masad Stealer managed to procure more than $7,500 worth of bitcoin over the course of 193 transactions.

How Masad Stealer Works

Besides clipboards and browsers, Masad Stealer also collects information from a variety of other sources, including autofill fields in online forms, system information and cookies.

Much like similar threats, researchers said Masad Stealer tries to go unnoticed by bundling itself with legitimate software applications, such as CCleaner, Iobit and ProxySwitcher. It is easy to overlook the malware since it only takes up 1.5 MB in terms of file size.

Those who download packages containing those utilities and other applications allow the malware to get to work. Other than looking for more than 20 different kinds of cryptocurrency, Masad Stealer creates a scheduled task on the infected hosts, which is initiated on a minute-by-minute basis. This ensures it continues to run, no matter what else is happening to the victim’s machine.

Whereas some cybercriminal groups keep such tools for themselves, researchers said Masad Stealer is being actively promoted on black market forums as “Masad Clipper and Stealer.” At only $85 for the most advanced version, it’s well within reach of cryptocurrency thieves. In fact, a basic tier of the malware is free.

There is also a dedicated website offering the strain, and its authors have created a group with hundreds of members on — you guessed it — Telegram.

Get the Jump on CryptoJacking

The rise of cryptocurrencies has made malware like Masad Stealer more popular than ever, but security professionals are not without potential defenses. Unified endpoint management (UEM), for example, can be a good way to ensure that something downloaded by an individual user doesn’t infect the entire network.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today