Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Clipper Malware Slips Into Google Play

A piece of Android malware capable of hijacking users’ crypto-currency transactions has slipped into Google Play, ESET security researchers have discovered.

A piece of Android malware capable of hijacking users’ crypto-currency transactions has slipped into Google Play, ESET security researchers have discovered.

Detected as Android/Clipper.C, the malware masquerades as the legitimate service MetaMask. Its main purpose is to steal the victim’s credentials and private keys to take over their Ethereum wallets. It also hijacks funds by replacing Bitcoin and Ethereum wallet addresses on the clipboard. 

Malware capable of performing such attacks is relatively new, but is already an established category, especially on desktop computers. 

Referred to as “clippers,” these threats rely on the fact that addresses of online crypto-currency wallets are long strings of characters that user’s normally copy and paste using the clipboard. Whenr the victim attempts to perform a transaction, the malware intercepts copied crypto-wallet addresses and replaces them with the attacker’s. 

While on desktop PCs running Windows such malware first emerged in 2017, it arrived on Android only in 2018, and has only been found in shady Android app stores, until working its way into Google’s official app store. 

The recently discovered clipper appeared in the Google Play store on February 1, 2019 and was removed immediately after ESET reported it to the Google Play security team.

The intended victims of this malware are users of the mobile version of MetaMask, a service designed to run Ethereum decentralized apps in a browser, without having to run a full Ethereum node. 

At the moment, the service only offers only add-ons for desktop browsers such as Chrome and Firefox, but no mobile application, ESET points out.

Advertisement. Scroll to continue reading.

For some cybercriminals, this appeared as an opportunity to create malicious applications and trick users into believing they are legitimate programs for the service. 

According to ESET, the clipper is only one of the malicious software impersonating MetaMask that was found in Google Play. Previously discovered malware, however, was phishing for sensitive information, attempting to take over the victims’ crypto-currency wallets. 

To stay protected, users are advised to always check the official website of the app developer or service provider for a link to the official app, to make sure they download and install legitimate software. 

Users should also double-check every step in all transactions that involve valuables, regardless of whether sensitive information or money, especially when using the clipboard (in which case, they should make sure the pasted content is the same as the copied one. 

Keeping the Android device updated at all time and installing only software from the Google Play store are also advised. 

Related: ‘TimpDoor’ Malware Turns Android Devices into Proxies

Related: Android Apps Carrying Windows Malware Yanked From Google Play

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.