How You Lose Your Funds
The malware uses two sophisticated methods:
- Clipboard Hijacking: When you paste a wallet address, it stealthily swaps it with an attacker's address that is visually similar to the real one, making it extremely hard to spot the difference.
- Transaction Interception: It directly hooks into your wallet's functions. When you go to sign a transaction, it changes the recipient's address in the background before the confirmation prompt even appears.
How to Protect Yourself
- This malware targets BTC, ETH, SOL, TRX, LTC, and BCH.
- Your final confirmation screen is your last line of defense.
- You must meticulously verify every single character of the recipient address in your wallet app or on your hardware wallet screen before approving any transaction.