Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

ClipXDaemon, identified by Cyble’s Research & Intelligence Labs (CRIL), emerged in early February 2026 and targets desktop Linux environments running the X11 graphical interface. The malware arrives via a three-stage infection chain: an encrypted loader generated by the open-source bincrypter framework, a memory-resident dropper that decrypts using AES-256-CBC and gzip decompression, and an on-disk ELF payload written to ~/.local/bin/ with a random filename of eight to nineteen characters.

For persistence, the dropper appends an execution command to the user’s ~/.profile file, ensuring it runs on login without needing root privileges. Upon activation, ClipXDaemon checks for an X11 session; if Wayland is detected, it terminates immediately due to Wayland’s restrictions on global clipboard access. It then daemonizes via a double-fork process, closes file descriptors, and renames itself to “kworker/0:2-events” using prctl(PR_SET_NAME) to mimic a kernel worker thread, blending into process lists from tools like ps or top.

The core functionality involves polling the clipboard every 200 milliseconds via X11 APIs such as XConvertSelection and XGetWindowProperty. It scans for patterns matching eight cryptocurrencies—Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON—using encrypted regular expressions decrypted with ChaCha20. When a match is found, it replaces the content with attacker-controlled addresses before pasting occurs. Confirmed replacement wallets include those for Ethereum (0x502010513bf2d2B908A3C33DE5B65314831646e7), Bitcoin (bc1qe8g2rgac5rssdf5jxcyytrs769359ltle3ekle), and others for Monero, Dogecoin, Litecoin, and Tron. No replacements were observed for TON and Ripple, though they are monitored.

Notably, ClipXDaemon lacks any network activity, containing no embedded domains or IP addresses, and performs no DNS queries or connections. This C2-less design allows direct monetization without remote infrastructure. The loader shares structural similarities with ShadowHS malware from January 2026, but researchers found no evidence of shared operators, attributing overlaps to the common use of bincrypter.

Experts recommend migrating to Wayland, auditing ~/.profile and ~/.local/bin/, and verifying wallet addresses manually before transactions. The ELF payload evaded detection on VirusTotal at the time of analysis.

Liittyvät artikkelit

Dramatic illustration of a computer screen showing OpenClaw AI security warning from Chinese cybersecurity agency, with hacker threats and vulnerability symbols.
AI:n luoma kuva

Chinese cybersecurity agency warns of OpenClaw AI risks

Raportoinut AI AI:n luoma kuva

China's national cybersecurity authority has warned of security risks in the OpenClaw AI agent software, which could allow attackers to gain full control of users' computer systems. The software has seen rapid growth in downloads and usage, with major domestic cloud platforms offering one-click deployment services, but its default security configuration is weak.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Raportoinut AI

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

Raportoinut AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Tämä verkkosivusto käyttää evästeitä

Käytämme evästeitä analyysiä varten parantaaksemme sivustoamme. Lue tietosuojakäytäntömme tietosuojakäytäntö lisätietoja varten.
Hylkää