October 1, 2019 By Shane Schick 2 min read

A malware strain dubbed Masad Stealer is using the Telegram messaging app to steal cryptocurrency by accessing browser passwords and clipboard information, security researchers learned.

As detailed in a blog post from Juniper Labs, the malware can allow cybercriminals to replace clipboard information with addresses they control, using Telegram to exfiltrate the information. This process lets attackers access wallets containing Monero, Ether, bitcoin and other forms of cryptocurrency.

The investigation highlighted one instance in which an address that was swapped using Masad Stealer managed to procure more than $7,500 worth of bitcoin over the course of 193 transactions.

How Masad Stealer Works

Besides clipboards and browsers, Masad Stealer also collects information from a variety of other sources, including autofill fields in online forms, system information and cookies.

Much like similar threats, researchers said Masad Stealer tries to go unnoticed by bundling itself with legitimate software applications, such as CCleaner, Iobit and ProxySwitcher. It is easy to overlook the malware since it only takes up 1.5 MB in terms of file size.

Those who download packages containing those utilities and other applications allow the malware to get to work. Other than looking for more than 20 different kinds of cryptocurrency, Masad Stealer creates a scheduled task on the infected hosts, which is initiated on a minute-by-minute basis. This ensures it continues to run, no matter what else is happening to the victim’s machine.

Whereas some cybercriminal groups keep such tools for themselves, researchers said Masad Stealer is being actively promoted on black market forums as “Masad Clipper and Stealer.” At only $85 for the most advanced version, it’s well within reach of cryptocurrency thieves. In fact, a basic tier of the malware is free.

There is also a dedicated website offering the strain, and its authors have created a group with hundreds of members on — you guessed it — Telegram.

Get the Jump on CryptoJacking

The rise of cryptocurrencies has made malware like Masad Stealer more popular than ever, but security professionals are not without potential defenses. Unified endpoint management (UEM), for example, can be a good way to ensure that something downloaded by an individual user doesn’t infect the entire network.

More from

New memo reveals Biden’s cybersecurity priorities through fiscal year 2026

2 min read - On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026. Key highlights from the FY26 memorandum In the latest annual version…

How prepared are you for your first Gen AI disruption?

5 min read - Generative artificial intelligence (Gen AI) and its use by businesses to enhance operations and profits are the focus of innovation in virtually every sector and industry. Gartner predicts that global spending on AI software will surge from $124 billion in 2022 to $297 billion by 2027. Businesses are upskilling their teams and hiring costly experts to implement new use cases, new ways to leverage data and new ways to use open-source tooling and resources. What they have failed to look…

Cybersecurity crisis communication: What to do

4 min read - Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication. Because a brand’s reputation often takes a significant hit, a cyberattack can significantly affect the company’s future…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today