latest news

more articles

new about market

more articles

Learn something new

more articles

community's choice

more articles

community's choice

more articles

CoinwaftDeFi News

Fake Microsoft Extensions Embed Malware to Steal Crypto: Report

Cybercriminals target Russian users with ClipBanker malware hidden in fake Microsoft Office packages on SourceForge, hijacking cryptocurrency transactions by swapping wallet addresses and stealing sensitive data via Telegram.

By Amoo Jubril

April 9, 2025 at 7:39 PM

Last updated

April 9, 2025 at 7:39 PM

Fake Microsoft Extensions Embed Malware to Steal Crypto: Report

According to a new report by Kaspersky’s Anti-Malware Research Team, cybercriminals are now hiding crypto-stealing malware inside fake Microsoft Office extension packages hosted on SourceForge.

The campaign, which primarily targets Russian users, uses a deceptive package called “officepackage” to lure in unsuspecting victims.

Kaspersky’s investigation reveals that these fake downloads cleverly bundle legitimate Office add-ins with a sinister extra, ClipBanker malware. Once installed, ClipBanker silently monitors the user’s clipboard for cryptocurrency wallet addresses.

When a user copies their wallet address, say, to make a transfer, the malware instantly swaps it out with the attacker’s address, then Crypto funds end up in the wrong wallet, and the user is none the wiser until it’s too late.

How the Malware Operates

What makes this malware especially dangerous is how well it hides in plain sight. The Kaspersky team points out that some of the infected files are suspiciously small—an immediate red flag, as genuine Office installation packages are typically much larger.

In some cases, attackers even pad these files with useless data to make them look more legitimate. It’s a smart move, designed to trick users who may not pay close attention to file sizes or sources.

Once active, the malware wastes no time. It not only hijacks clipboard data but also sends sensitive device info, like usernames, IP addresses, and geolocation, back to its creators using Telegram. 

The malware is even programmed to check for antivirus software or whether it’s already installed; if either is detected, it self-destructs to avoid exposure.

Beyond clipboard hijacking, the malware may also deploy a crypto miner to siphon off processing power for mining digital currency. But it doesn’t stop there, Kaspersky warns that attackers could sell access to infected systems, opening the door to more dangerous threats down the line.

Why Download Vigilance Matters

This attack shines a spotlight on a growing issue: the exploitation of open-source software platforms like SourceForge. Because these repositories are open to the public, they can become breeding grounds for malicious uploads disguised as legitimate tools.

Kaspersky reported that between early January and late March, 4,604 users encountered the infected software. The bulk of the victims so far are in Russia. The interface of the fake installers is in Russian, suggesting a targeted campaign. Still, with SourceForge accessible worldwide, the threat is anything but local.

To stay safe, users are urged to avoid pirated or unofficial software and stick to trusted sources. As Threat Fabric recently noted on March 28, 2025, cybercriminals are constantly evolving—leveraging convincing fake websites, pirated apps, and overlays to trick even experienced users.

Disclaimer: Coinwaft is a crypto media platform providing cryptocurrency news, analysis, and trading information. The content of this article is for informational purposes only and should not be considered as financial, legal, or investment advice. Readers are advised once again to research or consult a financial expert before making any financial decision.

© 2025 Coinwaft. All Rights Reserved.

Amoo Jubril

Amoo Jubril

Writer

Author profile

Get the daily newsletter that helps thousands of investors get early alpha and understand the markets.

By pressing the "Subscribe button" you agree with our Privacy Policy.

© 2025 Coinwaft. All Right Reserved.

Coinwaft uses cookies to offer a better browsing experience. By clicking accept, you consent to our privacy policy & use of cookies.