Description

Security researchers have discovered ClipXDaemon, a Linux-based malware designed to intercept and alter cryptocurrency wallet addresses copied to the clipboard. The malware specifically targets systems running the X11 graphical environment, silently replacing legitimate wallet addresses with attacker-controlled ones before a user pastes them into a transaction field. Unlike many malware families, ClipXDaemon does not rely on command-and-control infrastructure, enabling it to operate independently and making network-based detection more difficult. The infection chain begins with a loader created using the open-source bincrypter framework. This loader decrypts and launches a memory-resident dropper that eventually deploys the final clipboard hijacking payload as an ELF binary. Once executed, the payload detaches itself from the terminal using a double-fork daemonization technique, allowing it to run quietly in the background as a persistent process. After installation, the malware connects directly to the system’s X server and repeatedly checks clipboard contents using native X11 APIs. The clipboard is scanned approximately every 200 milliseconds for patterns that match cryptocurrency wallet formats. When a match is detected—such as addresses associated with Bitcoin, Ethereum, Monero, or Dogecoin—the malware substitutes the copied address with one controlled by the attacker. To remain hidden, ClipXDaemon includes several evasion techniques. It avoids running on systems using the Wayland display protocol, where clipboard monitoring is more restricted. The malware also disguises itself by adopting process names that resemble legitimate kernel worker threads, such as kworker, to blend into normal system activity. Additionally, configuration data, including wallet patterns and replacement addresses, is encrypted using the ChaCha20 algorithm to complicate analysis.