October 1, 2019 By Shane Schick 2 min read

A malware strain dubbed Masad Stealer is using the Telegram messaging app to steal cryptocurrency by accessing browser passwords and clipboard information, security researchers learned.

As detailed in a blog post from Juniper Labs, the malware can allow cybercriminals to replace clipboard information with addresses they control, using Telegram to exfiltrate the information. This process lets attackers access wallets containing Monero, Ether, bitcoin and other forms of cryptocurrency.

The investigation highlighted one instance in which an address that was swapped using Masad Stealer managed to procure more than $7,500 worth of bitcoin over the course of 193 transactions.

How Masad Stealer Works

Besides clipboards and browsers, Masad Stealer also collects information from a variety of other sources, including autofill fields in online forms, system information and cookies.

Much like similar threats, researchers said Masad Stealer tries to go unnoticed by bundling itself with legitimate software applications, such as CCleaner, Iobit and ProxySwitcher. It is easy to overlook the malware since it only takes up 1.5 MB in terms of file size.

Those who download packages containing those utilities and other applications allow the malware to get to work. Other than looking for more than 20 different kinds of cryptocurrency, Masad Stealer creates a scheduled task on the infected hosts, which is initiated on a minute-by-minute basis. This ensures it continues to run, no matter what else is happening to the victim’s machine.

Whereas some cybercriminal groups keep such tools for themselves, researchers said Masad Stealer is being actively promoted on black market forums as “Masad Clipper and Stealer.” At only $85 for the most advanced version, it’s well within reach of cryptocurrency thieves. In fact, a basic tier of the malware is free.

There is also a dedicated website offering the strain, and its authors have created a group with hundreds of members on — you guessed it — Telegram.

Get the Jump on CryptoJacking

The rise of cryptocurrencies has made malware like Masad Stealer more popular than ever, but security professionals are not without potential defenses. Unified endpoint management (UEM), for example, can be a good way to ensure that something downloaded by an individual user doesn’t infect the entire network.

More from

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today