Clipboard Hijacking Attacks Target Crypto Addresses
Malware can watch everything you copy
Including crypto addresses.
Clipboard hijacking is one of the most subtle crypto attacks. Malware monitors your clipboard for patterns that look like cryptocurrency addresses.
When you copy a legitimate address, the malware instantly replaces it with an attacker's address. The switch happens in milliseconds. Most users never notice.
How clipboard attacks work
The attack begins when malware infects your device. This can happen through malicious downloads, compromised websites, or infected email attachments.
Once installed, the malware runs silently in the background. It monitors every copy operation you perform. The malware uses pattern recognition to identify crypto addresses.
Bitcoin addresses start with specific characters. Ethereum addresses follow a different format. The malware knows these patterns.
When you copy what looks like a crypto address, the malware immediately overwrites it. Your clipboard now contains the attacker's address instead of your intended destination.
Why this attack succeeds
Most people copy addresses rather than typing them manually. The process feels automatic and safe.
Users rarely double-check the pasted address against the original. The first few characters often match between legitimate and malicious addresses.
By the time you notice the mistake, the transaction is irreversible. Your crypto has moved to the attacker's wallet.
A real world scenario
A user wanted to send Bitcoin to their hardware wallet.
They copied the receive address from their wallet software.
The malware replaced it with a similar-looking address owned by the attacker.
The user pasted the address and sent the transaction without verifying it first.
The Bitcoin went to the wrong wallet and could not be recovered.
How to protect against clipboard attacks
Always verify the full address after pasting it. Do not just check the first few characters.
- Use QR codes when possible instead of copying text addresses
- Keep your operating system and antivirus software updated
- Avoid downloading software from untrusted sources
- Never copy crypto addresses on public or shared computers
- Consider using address book features in your wallet software
Some users write down shorter addresses by hand for smaller amounts. Others use hardware wallets with address verification on the device screen.
Where hardware wallets help
Hardware wallets display the full destination address on their screens during transaction signing. This happens outside your computer where malware cannot interfere.
The device shows you exactly where your crypto will go before you approve the transaction. You can compare this address with your intended destination.
If the addresses do not match, you can cancel the transaction immediately. This verification step catches clipboard attacks before any damage occurs.
Unsure about your current security setup
Some users rely entirely on copying and pasting addresses from their computers. Others use mobile wallets that might have similar vulnerabilities.
The right approach depends on how much crypto you handle and how often you make transfers.
You can use our wallet selector to find a suitable hardware wallet based on your security needs.
Find the right wallet in under a minute
Final thought
Clipboard attacks are invisible until they succeed. Hardware verification makes them visible before they can cause damage.
Never miss an issue
Get practical self custody guidance delivered to your inbox every week.
Subscribe to Crypto Compass