Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

ClipXDaemon, identified by Cyble’s Research & Intelligence Labs (CRIL), emerged in early February 2026 and targets desktop Linux environments running the X11 graphical interface. The malware arrives via a three-stage infection chain: an encrypted loader generated by the open-source bincrypter framework, a memory-resident dropper that decrypts using AES-256-CBC and gzip decompression, and an on-disk ELF payload written to ~/.local/bin/ with a random filename of eight to nineteen characters.

For persistence, the dropper appends an execution command to the user’s ~/.profile file, ensuring it runs on login without needing root privileges. Upon activation, ClipXDaemon checks for an X11 session; if Wayland is detected, it terminates immediately due to Wayland’s restrictions on global clipboard access. It then daemonizes via a double-fork process, closes file descriptors, and renames itself to “kworker/0:2-events” using prctl(PR_SET_NAME) to mimic a kernel worker thread, blending into process lists from tools like ps or top.

The core functionality involves polling the clipboard every 200 milliseconds via X11 APIs such as XConvertSelection and XGetWindowProperty. It scans for patterns matching eight cryptocurrencies—Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON—using encrypted regular expressions decrypted with ChaCha20. When a match is found, it replaces the content with attacker-controlled addresses before pasting occurs. Confirmed replacement wallets include those for Ethereum (0x502010513bf2d2B908A3C33DE5B65314831646e7), Bitcoin (bc1qe8g2rgac5rssdf5jxcyytrs769359ltle3ekle), and others for Monero, Dogecoin, Litecoin, and Tron. No replacements were observed for TON and Ripple, though they are monitored.

Notably, ClipXDaemon lacks any network activity, containing no embedded domains or IP addresses, and performs no DNS queries or connections. This C2-less design allows direct monetization without remote infrastructure. The loader shares structural similarities with ShadowHS malware from January 2026, but researchers found no evidence of shared operators, attributing overlaps to the common use of bincrypter.

Experts recommend migrating to Wayland, auditing ~/.profile and ~/.local/bin/, and verifying wallet addresses manually before transactions. The ELF payload evaded detection on VirusTotal at the time of analysis.

Verwandte Artikel

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Bild generiert von KI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Von KI berichtet Bild generiert von KI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Von KI berichtet

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Von KI berichtet

Threat actors are using comments on Pastebin to promote a scam that tricks cryptocurrency users into running malicious JavaScript on Swapzone.io, hijacking Bitcoin transactions. The attack, a variant of ClickFix techniques, redirects funds to attacker-controlled wallets while mimicking legitimate arbitrage profits. This appears to be the first known instance of such a browser-based ClickFix targeting crypto exchanges.

Infostealer malware has targeted OpenClaw AI agents for the first time, according to a TechRadar report. The incident highlights vulnerabilities in locally deployed AI systems that store sensitive information. The article was published on February 17, 2026.

Von KI berichtet

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen