Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

Posted on March 9, 2026 By CWS

A newly identified malware named ClipXDaemon poses a significant risk to users of Linux operating systems, specifically targeting those managing cryptocurrency in X11 desktop environments. This malicious software operates independently, monitoring the clipboard every 200 milliseconds to replace legitimate wallet addresses with those under the control of the attacker.

Understanding ClipXDaemon’s Unique Operation

ClipXDaemon distinguishes itself from typical malware by not requiring command-and-control (C2) servers. It functions entirely on the victim’s system, leaving no digital footprint that could be traced back to external servers or network communications. This lack of network activity makes it particularly challenging for traditional cybersecurity measures to detect.

First identified in February 2026, ClipXDaemon emerged from a loader structure also associated with ShadowHS, a Linux threat known for deploying post-exploitation tools against servers. Despite using the same bincrypter for obfuscation, the two threats have different targets and methods, as ShadowHS focuses on servers, while ClipXDaemon zeroes in on desktop users involved in cryptocurrency transactions.

Technical Details and Obfuscation Techniques

ClipXDaemon employs advanced encryption techniques to protect its malicious payload. The malware encrypts wallet regex patterns and replacement addresses using ChaCha20, a stream cipher that prevents static analysis. Cyble analysts confirmed that it targets eight cryptocurrencies, including Bitcoin and Ethereum, actively replacing wallet addresses for six of them during testing.

What sets ClipXDaemon apart is its sophisticated infection chain designed to avoid detection. It begins with an encrypted loader generated by bincrypter, which decodes and decrypts the payload without writing it to disk, utilizing a /proc/self/fd file descriptor instead. This method minimizes the traces left behind, complicating detection efforts.

Mitigation Strategies for Linux Users

To mitigate the risks posed by ClipXDaemon, Linux users, especially those involved in cryptocurrency transactions, should consider migrating from X11 to Wayland, which restricts the clipboard access ClipXDaemon exploits. System administrators are advised to monitor changes to ~/.profile and ~/.bashrc, scrutinize new executables in ~/.local/bin/, and investigate any suspicious processes mimicking kernel threads.

Behavioral endpoint detection and response (EDR) strategies should be employed to alert on the execution of ELF binaries via /proc/self/fd and detect frequent clipboard polling activities. Users are encouraged to manually verify wallet addresses before confirming transactions and consider using hardware wallets for added security.

Stay informed and secure by following trusted cybersecurity sources. For real-time updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as your preferred source in Google.

Cyber Security News Tags:ChaCha20 encryption, clipboard hijacker, ClipXDaemon, cryptocurrency security, cryptocurrency wallets, cyber threats, Cybersecurity, Linux malware, open-source tools, X11 sessions

Post navigation

Previous Post: New ClickFix Variant Exploits Windows Terminal
Next Post: Microsoft 365 Introduces Copilot Cowork for Task Automation

Related Posts

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cyber Security News
Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Cyber Security News
From SOC to SOAR Automating Security Operations From SOC to SOAR Automating Security Operations Cyber Security News
Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims Cyber Security News
SAP Addresses Critical Code Injection in CRM and S/4HANA SAP Addresses Critical Code Injection in CRM and S/4HANA Cyber Security News
Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Risk Advisors Unveils 2026 Cybersecurity Report
  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Risk Advisors Unveils 2026 Cybersecurity Report
  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News