Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

Posted on March 9, 2026 By CWS

A newly identified malware named ClipXDaemon poses a significant risk to users of Linux operating systems, specifically targeting those managing cryptocurrency in X11 desktop environments. This malicious software operates independently, monitoring the clipboard every 200 milliseconds to replace legitimate wallet addresses with those under the control of the attacker.

Understanding ClipXDaemon’s Unique Operation

ClipXDaemon distinguishes itself from typical malware by not requiring command-and-control (C2) servers. It functions entirely on the victim’s system, leaving no digital footprint that could be traced back to external servers or network communications. This lack of network activity makes it particularly challenging for traditional cybersecurity measures to detect.

First identified in February 2026, ClipXDaemon emerged from a loader structure also associated with ShadowHS, a Linux threat known for deploying post-exploitation tools against servers. Despite using the same bincrypter for obfuscation, the two threats have different targets and methods, as ShadowHS focuses on servers, while ClipXDaemon zeroes in on desktop users involved in cryptocurrency transactions.

Technical Details and Obfuscation Techniques

ClipXDaemon employs advanced encryption techniques to protect its malicious payload. The malware encrypts wallet regex patterns and replacement addresses using ChaCha20, a stream cipher that prevents static analysis. Cyble analysts confirmed that it targets eight cryptocurrencies, including Bitcoin and Ethereum, actively replacing wallet addresses for six of them during testing.

What sets ClipXDaemon apart is its sophisticated infection chain designed to avoid detection. It begins with an encrypted loader generated by bincrypter, which decodes and decrypts the payload without writing it to disk, utilizing a /proc/self/fd file descriptor instead. This method minimizes the traces left behind, complicating detection efforts.

Mitigation Strategies for Linux Users

To mitigate the risks posed by ClipXDaemon, Linux users, especially those involved in cryptocurrency transactions, should consider migrating from X11 to Wayland, which restricts the clipboard access ClipXDaemon exploits. System administrators are advised to monitor changes to ~/.profile and ~/.bashrc, scrutinize new executables in ~/.local/bin/, and investigate any suspicious processes mimicking kernel threads.

Behavioral endpoint detection and response (EDR) strategies should be employed to alert on the execution of ELF binaries via /proc/self/fd and detect frequent clipboard polling activities. Users are encouraged to manually verify wallet addresses before confirming transactions and consider using hardware wallets for added security.

Stay informed and secure by following trusted cybersecurity sources. For real-time updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as your preferred source in Google.

Cyber Security News Tags:ChaCha20 encryption, clipboard hijacker, ClipXDaemon, cryptocurrency security, cryptocurrency wallets, cyber threats, Cybersecurity, Linux malware, open-source tools, X11 sessions

Post navigation

Previous Post: New ClickFix Variant Exploits Windows Terminal
Next Post: Microsoft 365 Introduces Copilot Cowork for Task Automation

Related Posts

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Cyber Security News
New Tactics by AMOS Malware Target Apple Users New Tactics by AMOS Malware Target Apple Users Cyber Security News
Feiniu NAS Devices Targeted in Major Botnet Attack Feiniu NAS Devices Targeted in Major Botnet Attack Cyber Security News
Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical ExifTool Vulnerability Exposes macOS to Hidden Threats
  • February 2026 Cybersecurity M&A: Key Deals Highlighted
  • Security Risk Advisors Unveils 2026 Cybersecurity Report
  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical ExifTool Vulnerability Exposes macOS to Hidden Threats
  • February 2026 Cybersecurity M&A: Key Deals Highlighted
  • Security Risk Advisors Unveils 2026 Cybersecurity Report
  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News