Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

Posted on January 20, 2026January 20, 2026 By CWS

A brand new clipboard hijacker is quietly draining cryptocurrency from avid gamers and streamers by abusing belief inside Discord communities.

The marketing campaign facilities on a malicious Home windows program shared as a supposed streaming or safety device. As soon as put in, it silently watches the person’s clipboard, ready for the second they copy a crypto pockets tackle.

When the sufferer pastes it into an change, pockets, or cost subject, the malware swaps it with an attacker-controlled tackle, redirecting the funds with out leaving apparent traces.

The menace actor, tracked as “RedLineCyber,” focuses on Discord servers linked to gaming, playing, and cryptocurrency streaming.

They construct rapport with server members, current themselves as device builders, and privately share a file named Professional.exe or peeek.exe.

Victims are advised the device will assist them handle or defend their pockets addresses throughout dwell periods, making it seem helpful quite than suspicious.

Behind this pleasant pitch is a targeted theft operation that may quietly empty transactions in a single mistyped paste.

CloudSEK analysts uncovered this operation whereas monitoring underground communities and Discord channels utilized by cybercriminals.

Throughout these human intelligence operations, researchers recognized the pretend “RedLine Options” persona and traced the malware again to a Python-based executable filled with PyInstaller.

Their evaluation confirmed that this system doesn’t behave like basic information-stealing malware, however as a substitute narrows its exercise to at least one process: manipulating clipboard knowledge linked to widespread cryptocurrencies.

Redline Answer (Supply – CloudSEK)

The influence of this marketing campaign is critical as a result of it targets customers on the actual level the place human consideration is weakest. Many streamers and frequent merchants copy and paste lengthy pockets strings with out double-checking each character.

By working with out command-and-control visitors and utilizing minimal system sources, the malware can stay lively for lengthy intervals, ready for high-value transfers.

Blockchain traces linked to the attacker’s embedded pockets addresses already present stolen funds throughout Bitcoin, Ethereum, Solana, Dogecoin, Litecoin, and Tron.

An infection Mechanism and Clipboard Hijacking Logic

As soon as a sufferer launches Professional.exe, the malware creates a folder named CryptoClipboardGuard contained in the Home windows %APPDATA% listing and registers itself within the Run key of the present person’s registry.

This ensures it begins routinely each time the system boots, persisting within the background with none seen window.

The executable bundles its personal Python runtime and obfuscated bytecode, enabling it to run even on programs with out Python put in.

It then enters a decent loop, checking the clipboard roughly 3 times per second.

PyInstaller (Supply – CloudSEK)

Each time the clipboard content material modifications, the malware scans it towards base64-encoded common expressions that match pockets codecs for main cryptocurrencies.

If it detects a sound tackle, it instantly overwrites the clipboard with a preset attacker pockets for that coin and information the swap in an exercise.log file inside %APPDATApercentCryptoClipboardGuard.

Cryptocurrency Handle Detection (Supply – CloudSEK)

As a result of the tackle change occurs between copy and paste, most victims by no means discover the substitute till their funds arrive within the fallacious pockets — and by then, the switch is irreversible.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Abuse, Addresses, Attackers, Clipboard, Deliver, Discord, Hijacker, Paste, Steals, Wallet

Post navigation

Previous Post: Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data
Next Post: Weaponized Invite Enabled Calendar Data Theft via Google Gemini

Related Posts

Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities Cyber Security News
WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks Cyber Security News
Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News
PureHVNC RAT Developers Leverage GitHub Host Source Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized Invite Enabled Calendar Data Theft via Google Gemini
  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized Invite Enabled Calendar Data Theft via Google Gemini
  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark