Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit Proxifier to Spread Crypto Malware

Cybercriminals Exploit Proxifier to Spread Crypto Malware

Posted on April 14, 2026 By CWS

A new malware campaign has emerged, targeting cryptocurrency users through a deceptive version of Proxifier, a widely used proxy software. Cybercriminals have set up a GitHub repository that appears to offer a legitimate Proxifier download, but instead, hosts a Trojan designed to monitor and manipulate clipboard activity to steal cryptocurrency funds.

Deceptive GitHub Repository Raises Alarm

The attack begins innocuously, with users searching for “Proxifier” and being directed to a counterfeit GitHub repository via search engine results. This repository is made to look credible, displaying source code for a basic proxy service. However, the download package contains a Trojan-disguised executable, alongside a text file with activation keys, enhancing its appearance of legitimacy.

Researchers from Securelist first identified this campaign in early 2026, noting its activity since 2025. The infection chain is complex, with several stages designed to maintain the malware’s stealth. Over 2,000 Kaspersky users have encountered this threat, predominantly in India and Vietnam.

ClipBanker Targets Cryptocurrency Users

The malware, known as ClipBanker, specifically targets cryptocurrency users by hijacking clipboard operations. When a victim copies a wallet address, the malware substitutes it with an address controlled by the attackers. This threat extends across 26 blockchain networks, including Bitcoin, Ethereum, Solana, and more, allowing cybercriminals broad access to various crypto ecosystems.

The campaign’s efficacy is largely due to its convincing packaging and strategic promotion within search results, luring unsuspecting users to download what they believe to be legitimate software, unaware of the impending risk to their cryptocurrency.

Infection Chain and Evasion Tactics

Upon execution, the malicious installer initiates a series of actions. A small stub file is created in the system’s temp folder, mimicking a genuine Proxifier process. A .NET application is injected to bypass Microsoft Defender detections, ensuring subsequent stages proceed unnoticed.

The legitimate Proxifier installer runs in the foreground to allay user suspicion, while the Trojan operates in the background. It injects malicious code into trusted Windows utilities and executes an obfuscated PowerShell script directly in memory, avoiding detection. Key tasks involve modifying Defender settings and using registry keys to store encoded scripts, which are triggered by scheduled tasks upon user login.

The final payload is downloaded and injected into system processes, enabling ClipBanker to monitor clipboard activity discreetly.

To mitigate such threats, users are advised to download software only from verified sources and maintain robust, up-to-date security solutions. For those without paid security tools, careful verification of download sources is essential to prevent malicious infections.

Cyber Security News Tags:blockchain networks, ClipBanker, clipboard hijacking, crypto malware, Cryptocurrency, Cybersecurity, digital security, fileless malware, GitHub, infection chain, malware campaign, PowerShell script, Proxifier, security solutions, Trojan

Post navigation

Previous Post: Rockstar Data Breach: 78.6 Million Records Exposed
Next Post: ShowDoc Vulnerability CVE-2025-0520 Exploited in the Wild

Related Posts

Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal  Million in Ethereum Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal $9 Million in Ethereum Cyber Security News
Sweet Security Brings Runtime-CNAPP Power to Windows Sweet Security Brings Runtime-CNAPP Power to Windows Cyber Security News
Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Cyber Security News
Ericsson USA Reveals Third-Party Data Breach Ericsson USA Reveals Third-Party Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights Six Exploited Flaws in Major Software
  • ShowDoc Vulnerability CVE-2025-0520 Exploited in the Wild
  • Cybercriminals Exploit Proxifier to Spread Crypto Malware
  • Rockstar Data Breach: 78.6 Million Records Exposed
  • Urgent Security Updates Issued for Apache Tomcat Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights Six Exploited Flaws in Major Software
  • ShowDoc Vulnerability CVE-2025-0520 Exploited in the Wild
  • Cybercriminals Exploit Proxifier to Spread Crypto Malware
  • Rockstar Data Breach: 78.6 Million Records Exposed
  • Urgent Security Updates Issued for Apache Tomcat Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark