Laplas Clipper

Info Stealing

Windows

Laplas Clipper

Laplas Clipper

Laplas Clipper is a clipboard hijacker malware that specifically targets cryptocurrency users. It monitors the victim's clipboard for cryptocurrency wallet addresses and replaces them with an attacker-controlled address. This results in fraudulent transactions, redirecting funds to the malicious wallet without the user's knowledge.

Known Variants

Known Variants

Laplas Clipper has been observed in multiple forms, including C++-based versions, with both EXE and DLL file types. Future updates are expected to add functionality that checks the victim's cryptocurrency wallet balance, increasing its capabilities.

Laplas Clipper has been observed in multiple forms, including C++-based versions, with both EXE and DLL file types. Future updates are expected to add functionality that checks the victim's cryptocurrency wallet balance, increasing its capabilities.

Mitigation Strategies

Mitigation Strategies

Always double-check cryptocurrency wallet addresses before confirming transactions. Download software and plugins only from trusted, official sources. Use reliable security software to detect and block malware. Stay informed about emerging cybersecurity threats and best practices.

Targeted Industries or Sectors

Targeted Industries or Sectors

The malware primarily targets individual cryptocurrency users. It is not tied to any particular industry but poses a significant risk to anyone involved in cryptocurrency transactions.

The malware primarily targets individual cryptocurrency users. It is not tied to any particular industry but poses a significant risk to anyone involved in cryptocurrency transactions.

Associated Threat Actors

Associated Threat Actors

Specific details regarding the threat actors behind Laplas Clipper remain unclear. However, it is sold as Malware-as-a-Service (MaaS) on platforms like Telegram channels and Darknet forums, suggesting its distribution among multiple threat actors.

Specific details regarding the threat actors behind Laplas Clipper remain unclear. However, it is sold as Malware-as-a-Service (MaaS) on platforms like Telegram channels and Darknet forums, suggesting its distribution among multiple threat actors.

References