Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

ClipXDaemon, identified by Cyble’s Research & Intelligence Labs (CRIL), emerged in early February 2026 and targets desktop Linux environments running the X11 graphical interface. The malware arrives via a three-stage infection chain: an encrypted loader generated by the open-source bincrypter framework, a memory-resident dropper that decrypts using AES-256-CBC and gzip decompression, and an on-disk ELF payload written to ~/.local/bin/ with a random filename of eight to nineteen characters.

For persistence, the dropper appends an execution command to the user’s ~/.profile file, ensuring it runs on login without needing root privileges. Upon activation, ClipXDaemon checks for an X11 session; if Wayland is detected, it terminates immediately due to Wayland’s restrictions on global clipboard access. It then daemonizes via a double-fork process, closes file descriptors, and renames itself to “kworker/0:2-events” using prctl(PR_SET_NAME) to mimic a kernel worker thread, blending into process lists from tools like ps or top.

The core functionality involves polling the clipboard every 200 milliseconds via X11 APIs such as XConvertSelection and XGetWindowProperty. It scans for patterns matching eight cryptocurrencies—Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON—using encrypted regular expressions decrypted with ChaCha20. When a match is found, it replaces the content with attacker-controlled addresses before pasting occurs. Confirmed replacement wallets include those for Ethereum (0x502010513bf2d2B908A3C33DE5B65314831646e7), Bitcoin (bc1qe8g2rgac5rssdf5jxcyytrs769359ltle3ekle), and others for Monero, Dogecoin, Litecoin, and Tron. No replacements were observed for TON and Ripple, though they are monitored.

Notably, ClipXDaemon lacks any network activity, containing no embedded domains or IP addresses, and performs no DNS queries or connections. This C2-less design allows direct monetization without remote infrastructure. The loader shares structural similarities with ShadowHS malware from January 2026, but researchers found no evidence of shared operators, attributing overlaps to the common use of bincrypter.

Experts recommend migrating to Wayland, auditing ~/.profile and ~/.local/bin/, and verifying wallet addresses manually before transactions. The ELF payload evaded detection on VirusTotal at the time of analysis.

Verwandte Artikel

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Bild generiert von KI

Researchers discover SSHStalker botnet infecting Linux servers

Von KI berichtet Bild generiert von KI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Von KI berichtet

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

China's national cybersecurity authority has warned of security risks in the OpenClaw AI agent software, which could allow attackers to gain full control of users' computer systems. The software has seen rapid growth in downloads and usage, with major domestic cloud platforms offering one-click deployment services, but its default security configuration is weak.

Von KI berichtet

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen