{"id":129557,"date":"2025-05-19T15:15:49","date_gmt":"2025-05-19T15:15:49","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=129557"},"modified":"2025-05-19T15:15:49","modified_gmt":"2025-05-19T15:15:49","slug":"chinese-printer-maker-spread-bitcoin-stealing-malware-report","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=129557","title":{"rendered":"Chinese printer maker spread Bitcoin stealing malware \u2014 Report"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsChinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers, according to local media reports.<br \/>\nChinese news outlet Landian News reported on May 19 that Shenzhen-based printer company Procolored has been distributing Bitcoin-stealing (BTC) malware alongside official drivers. The company reportedly used USB drivers to distribute malware-ridden drivers and uploaded the compromised software to cloud storage for global download.<br \/>\nA total of 9.3 BTC worth over $953,000 have been stolen, according to the report. Crypto tracking and compliance firm Slow Mist described how the malware operates in a May 19 X post:<br \/>\n\u201cThe official driver provided by this printer carries a backdoor program. It will hijack the wallet address in the user\u2019s clipboard and replace it with the attacker&#8217;s address.\u201c<br \/>\nSource: MistTrackRelated: Massive supply chain attack targeting small number of crypto companies: Kaspersky<br \/>\nYouTuber flags malware in Procolored drivers<br \/>\nLandian News recommended users who downloaded Procolored printer drivers in the past six months to \u201cimmediately perform a full system scan using antivirus software.\u201d Still, given the hit or miss nature of antivirus software, a full system reset is always the better option when in doubt:<br \/>\n\u201cIdeally, you should reinstall your operating system and thoroughly check old files.\u201c<br \/>\nThe issue was allegedly first reported by YouTuber Cameron Coward, whose antivirus software detected malware in the drivers while testing a Procolored UV printer. The software flagged the drive as containing a worm and a trojan virus named Foxif.<br \/>\nRelated: Coinbase faces $400M bill after insider phishing attack<br \/>\nCybersecurity company confirms crypto-stealing malware<br \/>\nWhen contacted, Procolored denied the claims and dismissed the antivirus tool flagging the drivers as a false positive. Coward turned to Reddit, where he shared the issue with cybersecurity professionals, attracting the attention of cybersecurity firm G-Data.<br \/>\nG-Data\u2019s investigation found that most of Procolored\u2019s drivers were hosted on the file hosting service MEGA, with uploads as old as October 2023. Analysis of those files confirmed that they were compromised by two distinct pieces of malware: backdoor Win32.Backdoor.XRedRAT.A and a crypto stealer designed to substitute addresses in the clipboard with those controlled by the attacker.<br \/>\nG-Data contacted Procolored, with the hardware producer saying it deleted the infected drivers from its storage on May 8 and re-scanned all files. Procolored attributed the malware to a supply chain compromise, stating that the malicious files were introduced through infected USB devices before being uploaded online.<br \/>\nRelated: Crypto drainers as a service: What you need to know<a href=\"https:\/\/cointelegraph.com\/news\/bitcoin-stealer-malware-found-in-official-printer-drivers?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsChinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers, according to local media reports. Chinese news outlet Landian News reported on May 19 that Shenzhen-based printer&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/129557"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=129557"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/129557\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=129557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=129557"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=129557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}