Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

Posted on March 9, 2026 By CWS

A newly identified malware named ClipXDaemon poses a significant risk to users of Linux operating systems, specifically targeting those managing cryptocurrency in X11 desktop environments. This malicious software operates independently, monitoring the clipboard every 200 milliseconds to replace legitimate wallet addresses with those under the control of the attacker.

Understanding ClipXDaemon’s Unique Operation

ClipXDaemon distinguishes itself from typical malware by not requiring command-and-control (C2) servers. It functions entirely on the victim’s system, leaving no digital footprint that could be traced back to external servers or network communications. This lack of network activity makes it particularly challenging for traditional cybersecurity measures to detect.

First identified in February 2026, ClipXDaemon emerged from a loader structure also associated with ShadowHS, a Linux threat known for deploying post-exploitation tools against servers. Despite using the same bincrypter for obfuscation, the two threats have different targets and methods, as ShadowHS focuses on servers, while ClipXDaemon zeroes in on desktop users involved in cryptocurrency transactions.

Technical Details and Obfuscation Techniques

ClipXDaemon employs advanced encryption techniques to protect its malicious payload. The malware encrypts wallet regex patterns and replacement addresses using ChaCha20, a stream cipher that prevents static analysis. Cyble analysts confirmed that it targets eight cryptocurrencies, including Bitcoin and Ethereum, actively replacing wallet addresses for six of them during testing.

What sets ClipXDaemon apart is its sophisticated infection chain designed to avoid detection. It begins with an encrypted loader generated by bincrypter, which decodes and decrypts the payload without writing it to disk, utilizing a /proc/self/fd file descriptor instead. This method minimizes the traces left behind, complicating detection efforts.

Mitigation Strategies for Linux Users

To mitigate the risks posed by ClipXDaemon, Linux users, especially those involved in cryptocurrency transactions, should consider migrating from X11 to Wayland, which restricts the clipboard access ClipXDaemon exploits. System administrators are advised to monitor changes to ~/.profile and ~/.bashrc, scrutinize new executables in ~/.local/bin/, and investigate any suspicious processes mimicking kernel threads.

Behavioral endpoint detection and response (EDR) strategies should be employed to alert on the execution of ELF binaries via /proc/self/fd and detect frequent clipboard polling activities. Users are encouraged to manually verify wallet addresses before confirming transactions and consider using hardware wallets for added security.

Stay informed and secure by following trusted cybersecurity sources. For real-time updates, follow us on Google News, LinkedIn, and X, and consider setting CSN as your preferred source in Google.

Cyber Security News Tags:ChaCha20 encryption, clipboard hijacker, ClipXDaemon, cryptocurrency security, cryptocurrency wallets, cyber threats, Cybersecurity, Linux malware, open-source tools, X11 sessions

Post navigation

Previous Post: New ClickFix Variant Exploits Windows Terminal
Next Post: Microsoft 365 Introduces Copilot Cowork for Task Automation

Related Posts

GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise Cyber Security News
Vulnerabilities Exposed in Socomec DIRIS M-70 Device Vulnerabilities Exposed in Socomec DIRIS M-70 Device Cyber Security News
GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware Cyber Security News
Active Directory Breach: Hackers Target NTDS.dit File Active Directory Breach: Hackers Target NTDS.dit File Cyber Security News
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark