Share this article

New Malware Swaps Out Crypto Wallet Addresses as You Type Them

A newly discovered piece of malware can secretly steal your crypto wallets and passwords.

Updated Dec 10, 2022, 8:08 p.m. Published Sep 27, 2019, 5:00 p.m.
default image

A new bit of malware called Masad Stealerhttps://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559 can replace wallet addresses as you type them thanks to malicious code injected into your browser. According to Juniper Networks, it also steals:

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters
PC and system information





Credit Card Browser Data



Browser passwords



Installed software and processes



Desktop Files



Screenshot of Desktop



Browser cookies



Steam files



AutoFill browser fields



Discord and Telegram data



FileZilla files

The program dumps this information to the malware controller's Telegram account, ensuring relative security for the data it steals. It can also clip and change monero, litecoin, zcash, dash and ethereum addresses automatically and uses special search functions to pinpoint these addresses on your clipboard. Once it swaps the addresses it can intercept crypto as its being sent to legitimate wallets.

The particular version of the malware Juniper studied sent crypto to this wallet which currently contains almost a one full bitcoin.

"Based on our telemetry, Masad Stealer’s main distribution vectors are masquerading as a legitimate tool or bundling themselves into third party tools," wrote the research organization. "Threat actors achieve end user downloads by advertising in forums, on third party download sites or on file sharing sites."

The software masquerades as useful-looking software like Tradebot_binance.exe, Galaxy Software Update.exe, and Fortniteaimbot 2019.exe. Once infected, the computer then begins communicating with the command and control Telegram channel and sends back private data.

The malware allegedly costs $40 on the dark web and is completely configurable and very dangerous, said Juniper.

"Juniper Threat Labs believes that Masad Stealer represents an active and ongoing threat. Command and Control bots are still alive and responding as of this writing, and the malware appears to still be available for purchase on the black market," wrote the researchers.

Hacker image via Michael Geiger/Unsplash

More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

Bitcoin gets 'base case' price target of $143,000 at Citigroup

Bitcoin (TheDigitalArtist/Pixabay)

The Wall Street bank said its bitcoin forecast relies on further crypto ETF inflows and a continued rally in traditional equity markets.

What to know:

  • Citigroup's base case for bitcoin (BTC) is a rise to $143,000 in 12 months.
  • Analysts highlight $70,000 as key support, with the potential for a sharp rise due to revived ETF demand and positive market forecasts.
  • The bear case sees bitcoin falling to $78,500 amid a global recession, while the bull case predicts a rise to $189,000 due to increased investor demand.