Researchers Uncover Keona Clipper Malware Used For Diverting Crypto Payments

June 27, 2022

Researchers from Cyble have discovered a new Clipper malware called Keona Clipper.

The Clipper malware is able to redirect payments in cryptocurrencies to wallets controlled by attackers. To do this, Keona Clipper constantly monitors the contents of a user’s clipboard and searches for cryptocurrency wallets.

Clipper malware is usually distributed in the form of trojanized applications that can be downloaded from the internet. The aim of the malware is to steal money or financial details by exploiting the Windows clipboard.

Keona Clipper was developed in the .NET programming language and protected by Confuser 1.x. Researchers identified more than 90 different Keona samples since May 2022, showing wide deployment.

Once executed, the malware notifies an attacker-controlled Telegram bot via the Telegram API. In situations where the computer is restarted, the malware also ensures that it is always running. This is achieved by creating autostart entries in the Windows registry.

To ensure persistence, the malware copies itself to several locations, including the Administrative Tools folder and the Startup folder.

After deployment, Keona Clipper silently monitors each clipboard and uses regular expressions to search for crypto wallets. As soon as a wallet is found, it is immediately replaced in the clipboard by a wallet address provided by the attacker.

The sources for this piece include an article in TechRepublic.

Top Stories

Related Articles

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

March 23, 2026 The U.S. Federal Communications Commission has banned the import of all new foreign-made consumer routers following a more...

March 19, 2026 The FBI has gone back to purchasing commercially available data, including Americans’ location histories, to support federal more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn