Newsinterpretation

MassJacker Malware Hijacks Cryptocurrency Transactions

A new and dangerous malware called MassJacker is putting cryptocurrency users at risk. According to security experts, this malware is mainly targeting people who search for pirated software online. It works by secretly hijacking cryptocurrency transactions and sending the money to hackers instead of the intended recipient.

This alarming discovery was made by cybersecurity researchers who found that the malware spreads through a website called pesktop[.]com. This website appears to offer free pirated software, but in reality, it tricks users into downloading harmful programs. Once the malware is installed on a computer, it starts monitoring everything the user copies to their clipboard.

How MassJacker Malware Works

MassJacker is classified as a “clipper malware.” This means that it watches what users copy and paste on their computers. Since many cryptocurrency transactions involve copying and pasting wallet addresses, the malware takes advantage of this habit. When a user copies a cryptocurrency wallet address, MassJacker quickly replaces it with a different address controlled by the hackers. The unsuspecting user then pastes this fake address when making a payment, unknowingly sending their cryptocurrency to the attackers instead.

The infection starts with an initial executable file that acts as a doorway for additional malware. It runs a PowerShell script that downloads other harmful software, including a botnet malware called Amadey and two .NET binaries designed for different computer architectures.

One of these files, named PackerE, downloads another encrypted file, which eventually loads the MassJacker malware into a legitimate Windows process called “InstalUtil.exe.” This method makes it harder for security programs to detect the threat.

To avoid detection, MassJacker uses several tricks, such as:

  • JIT Hooking: A technique that hides its activities from security tools.
  • Metadata Token Mapping: This makes it difficult to track which functions the malware is using.
  • A Custom Virtual Machine: Instead of running like a normal program, it executes its commands in a hidden way, making it harder to analyze.

Massive Cryptocurrency Theft Uncovered

The hackers behind MassJacker have already managed to collect a significant amount of cryptocurrency from their victims. Security researchers discovered a shocking 778,531 unique cryptocurrency wallet addresses connected to the attackers. Out of these, at least 423 wallets still had funds amounting to around $95,300 at the time of discovery.

However, the total amount of stolen cryptocurrency is much larger. Before the funds were transferred out, these wallets held a combined total of approximately $336,700 in digital assets. This indicates that the attackers have successfully stolen large amounts of money from unsuspecting users.

One particular wallet linked to the hackers was found to contain 600 SOL (Solana), worth about $87,000. This wallet had received funds from more than 350 different transactions, suggesting that many victims unknowingly sent their money to the criminals.

While the identity of the cybercriminals behind MassJacker remains unknown, experts have noticed similarities between this malware and another one called MassLogger. MassLogger has also used the JIT Hooking technique to avoid detection, suggesting that the same group or an associated team may be responsible for both attacks.

As MassJacker continues to spread, it is crucial for users to be cautious when downloading software, especially from unofficial sources. Always verify the authenticity of a website before downloading anything,and avoid using pirated software to reduce the risk of falling victim to such dangerous malware.

Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Global IT Giant Ingram Micro Hit by Massive Cyber Attack

A significant cyberattack has targeted Ingram Micro, a major...

Apple’s F1 $155M Success Story Can’t Hide Its AI Setbacks

A Box Office Win for Apple Apple recently celebrated a...

Shocking Vulnerability Exposed in Indian SMEs to Ransomware Attacks

Indian SMEs Are Still Easy Targets In 2025, a new...

PDF Phishing Hits Hard as Cybercriminals Imitate Big Tech Brands like Microsoft, Adobe and more

Cybercriminals are now using a new and dangerous trick...

Alarming macOS Malware Uses Sneaky Tricks to Steal Keychain Passwords

A new malware called NimDoor is making waves in...

🛑 Sanctions Slam Aeza! U.S. and UK Team Up to Shut Down Russia’s Ransomware Powerhouse

The United States has announced tough new sanctions against...

🔍 Double espionage crisis: Iran hacks emails, China targets U.S. troops

The United States is facing new spying threats from...

Cloudflare’s Power Move Against Exploitation: Launches New Tool to Monetize AI Bot Access

Cloudflare, a major internet company, has launched a brand-new...

✈️ Skyjacked: Qantas Confirms Cyberattack Exposing Data of 6 Million Flyers

Qantas, Australia's biggest airline, has confirmed a serious cyberattack...
error: Content is protected !!
Exit mobile version