Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Elite SOCs Operationalize Threat Intelligence: 3 Tactics
May 19, 2026
DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released
May 19, 2026
Malware Campaign Delivers Crypto Clipper via JS, PS
May 19, 2026
Home/Threats/Malware Campaign Delivers Crypto Clipper via JS, PS
Threats

Malware Campaign Delivers Crypto Clipper via JS, PS

A sophisticated malware campaign is actively siphoning cryptocurrency from victims worldwide. Threat actors are employing stealthy techniques, including JavaScript (JS) and PowerShell (PS), to deploy...

Jennifer sherman
Jennifer sherman
May 19, 2026 4 Min Read
1 0

A sophisticated malware campaign is actively siphoning cryptocurrency from victims worldwide. Threat actors are employing stealthy techniques, including JavaScript (JS) and PowerShell (PS), to deploy a crypto clipper, as detailed in a recent The malware does not rely on a single trick.

It starts with a malicious EXE file that runs a PowerShell command, pulling down an obfuscated JavaScript loader and executing it through mshta.exe, a legitimate Windows utility that attackers frequently abuse because the operating system trusts it by default.

This lets the malware blend into normal activity, giving it time to settle in before any defenses can respond.

Analysts at McAfee Labs, who authored the research and shared details in a report with Cyber Security News (CSN), noted that the campaign reached roughly 86,000 unique infected machines.

On average, around 5,000 infected systems were connecting to command-and-control infrastructure every single minute. Infections were highest in India, followed by Indonesia and the United States, with a strong presence across Southeast Asia.

Beyond internet-based delivery, the malware also spreads through USB drives. When instructed by its command server, CountLoader replaces files on connected external drives with LNK shortcut files.

Malware Campaign Deliver Crypto Clipper

Opening one silently runs the malware while also opening the original file, so victims notice nothing unusual. About 9,000 infections were traced back to this USB-based method.

The end goal is a cryptocurrency clipper. Once loaded into memory, it monitors the clipboard in the background.

The moment a user copies a wallet address, the clipper replaces it with one controlled by the attacker, silently rerouting funds with no visible warning to the victim.

The infection chain is designed to avoid detection at every stage. After the initial EXE runs, a scheduled task fires every 30 minutes to maintain persistence from the very first step.

Infection Chain (Source - McAfee)
Infection Chain (Source – McAfee)

The PowerShell script then decodes a Base64 payload and runs it using Invoke-Expression, a common technique for executing hidden code without writing anything to disk.

CountLoader then takes control as an HTA file loaded through mshta.exe. It hides its window, attempts to erase its own file if run locally, and cycles through command servers until one responds.

Once connected, it performs an encrypted handshake, grabs a JWT token, and sends back details about the infected host, including any installed cryptocurrency wallets or browser extensions.

The next stages involve a PowerShell packer that decrypts and launches a shellcode injector. Before injecting, the script disables AMSI, a Windows feature designed to catch malicious scripts, using a known public bypass.

The shellcode then loads the final payload directly into memory under systeminfo.exe, never touching the disk, making it significantly harder for security tools to detect.

Cryptocurrency Clipper Delivered via EtherHiding

What sets the final payload apart is how it locates its command server. Rather than hard-coding a domain that can be blocked or taken down, the clipper uses a technique called EtherHiding, fetching the server address straight from the Ethereum blockchain.

Since the blockchain is decentralized, there is no single point defenders can shut down to cut the malware off.

Global Distribution of CountLoader Infections (Source - McAfee)
Global Distribution of CountLoader Infections (Source – McAfee)

Once the server address is retrieved, the clipper silently monitors clipboard contents and supports multiple cryptocurrency formats, meaning it can swap Bitcoin, Ethereum, and other wallet addresses without the victim noticing.

Researchers measured the true scale of this campaign by registering a backup C2 domain and sinkholing infected traffic to their own server, effectively turning the attackers’ infrastructure against them.

To reduce risk, users should avoid running EXE files from untrusted sources, treat unknown USB drives with caution, and always verify wallet addresses before sending cryptocurrency.

Watching for unfamiliar scheduled tasks on Windows and keeping security software updated can also help detect this threat before serious damage is done.

Indicators of Compromise (IoCs):-

Type Indicator Description
File Hash (SHA256) 5f9ff671955a6d551595f9838aed063c496da5039be0d222fe84f96cb3e1d32a EXE Stage 1
URL https://memory-scanner[.]cc/Presentation[.]pdf PowerShell Stage 2 download URL
File Hash (SHA256) 3c278499c5e3ced3bf1a6a7287808c5267075f1dec0aa5c7be2c4c444f33f2bc PowerShell Stage 2 script
URL https://memory-scanner[.]cc/ CountLoader download URL
URL https://hell1-kitty[.]cc/update1_usb_usb_usb[.]VOcx4wEV8 CountLoader download URL
File Hash (SHA256) c68e436d4cb984db026210806f50d0c81eec5f6e4860197dab91fab6f31ef796 CountLoader v3.3
File Hash (SHA256) e2faad8111e7d47349cbc549b85e62231b8678057906bc813aad7242fa95ae63 CountLoader v4.1
File Hash (SHA256) e5e1d8ec4cd109df290752ee3d4b2cbc9de6df4360e9983548f1bc6b1d088540 CountLoader v4.1
Domain hell1-kitty[.]cc CountLoader C2 domain
Domain alphazero1-endscape[.]cc CountLoader C2 domain
Domain api-microservice-us1[.]com CountLoader C2 domain
Domain bucket-aws-s1[.]com CountLoader C2 domain
Domain bucket-aws-s2[.]com CountLoader C2 domain
Domain fileless-storage-s3[.]cc CountLoader C2 domain
Domain globalsnn1-new[.]cc CountLoader C2 domain
Domain globalsnn2-new[.]cc CountLoader C2 domain
Domain globalsnn3-new[.]cc CountLoader C2 domain
Domain handle-me-sv1[.]com CountLoader C2 domain
Domain hardware-office[.]cc CountLoader C2 domain
Domain health-smooth-eu1[.]com CountLoader C2 domain
Domain health-smooth-eu2[.]com CountLoader C2 domain
Domain health-smooth-eu3[.]com CountLoader C2 domain
Domain holiday-updateservice[.]com CountLoader C2 domain
Domain memory-protection-layer1[.]cc CountLoader C2 domain
Domain memory-protection-layer2[.]cc CountLoader C2 domain
Domain microservice-update-s1-bucket[.]cc CountLoader C2 domain
Domain microservice-update-s2-bucket[.]cc CountLoader C2 domain
Domain my-smart-house1[.]com CountLoader C2 domain
Domain polystore9-servicebucket[.]cc CountLoader C2 domain
Domain s3-updatehub[.]cc CountLoader C2 domain
File Hash (SHA256) 10593dbe9edfde7943fdaadd7882f190216b2f6502667daf701088a6e810deaf USB LNK file
File Hash (SHA256) 0a69a9cc75d65774e5eb90a4a739bd4335d33b176dc4923acb691bd45af66bdf USB LNK file
File Hash (SHA256) 27c6a6bda2c0ef3ecb78dad9c6bb7c3abaf2e32b3ad96f372a0102c0c9c0f08d USB LNK file
File Hash (SHA256) 2cd449f1bb24f05d2e240812a74bd62f2583bbbe4d0ccc9ae5736240e29a0068 USB LNK file
File Hash (SHA256) 30dcd5c71beb76d2f8df768d5fd9e9145cb8fbbfc951a63b969d26d3b64002b9 USB LNK file
File Hash (SHA256) dd4c7f5aae404816cf447b8090b620c1a1971a35c6791116aa3f871f00ae011b USB LNK file
File Hash (SHA256) 42a1fc74334c9a3b8720c79df55f84c7398bd31609eb10581e8c7155835498e3 USB LNK file
File Hash (SHA256) 9c0d334aac5a6f66016dc5ce8df75c46d519a4e6d16c68cf2b1405c81189186d USB LNK file
File Hash (SHA256) 44f6313e9542c0d51937a70160fe4137012905d8c79ad27ccc0021788ecfaa4e USB LNK file
URL https://hell1-kitty[.]cc/gamecenter[.]fileManager Payload launcher URL
URL https://hardware-office[.]cc/foundation[.]halflife Payload launcher URL
File Hash (SHA256) cbdfb46b9265a3dfb3bc6b0aade472dde28b1660dbd3ded3b67b1530b4497cca Payload launcher
File Hash (SHA256) 4a5e1d6ee1217e1fbacf54fc6017fbf9d24a25078266b02358d56a9c7437ceb7 PowerShell packer
File Hash (SHA256) 05becb67d8bf1e49fcfccb0d346b82368a2b1c2bf07316078c364c7b020154de Shellcode injector
File Hash (SHA256) 44daa1b68737b55a711963eec211c7c018bcba4cb6d68c286a4b45ea781a7d73 Shellcode
File Hash (SHA256) dc602cb53a9c24abfcdaadf0ca8256b5fb5cac6d91d20ed8431bdaaf51c0cafe Final clipper payload
URL https://edr-security-bucket1[.]cc/ Payload C2 server URL

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Operation Ramz Seizes 53 Servers: Cyber Linked Scams

Next Post

DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Critical Apache Flink Vulnerability Enables Remote code execution
May 19, 2026
Hackers Hijack Four-Faith Industrial Routers for Hijacking Botnet
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us