Clipboard hijacking (also called a clipboard hijacker or CryptoShuffler malware) is a type of malware that monitors your computer's clipboard in real-time and automatically replaces any cryptocurrency wallet address you copy with an attacker's wallet address — causing you to unknowingly send crypto to the attacker when you paste the address to initiate a transfer. HOW THE ATTACK WORKS You copy a wallet address from an exchange withdrawal page: 0xABCD...1234. Clipboard hijacking malware running silently in the background detects the clipboard contents matches a crypto address pattern (regex for 0x addresses, Bitcoin addresses starting with 1, 3, or bc1, etc.). The malware instantly replaces the clipboard contents with the attacker's address: 0xATTACKER...9999. You paste the address into the destination field, assuming it's the address you copied. You confirm the transaction. Funds arrive at the attacker's wallet. The entire substitution happens in milliseconds — invisibly. REAL-WORLD SCALE Clipboard hijackers have stolen hundreds of millions in cryptocurrency. The CryptoShuffler malware (discovered 2017) monitored for Bitcoin, Ethereum, Monero, and dozens of other address formats. A single clipboard hijacker campaign can harvest from thousands of victims simultaneously — it scales with no additional attacker effort. HOW TO DETECT AND PREVENT Always verify the full address after pasting: Before confirming any transaction, compare the pasted address character-by-character (or at minimum first 6 and last 6 characters) against your original source. This single habit prevents 100% of clipboard hijacking attacks. Anti-malware protection: Keep Windows Defender or a reputable anti-malware solution updated. Clipboard hijackers are detected by most modern AV software. Malwarebytes provides strong detection of crypto-targeting malware. Hardware wallets: Hardware wallets (Ledger, Trezor) display the recipient address on the device screen for confirmation — making clipboard substitution visible before the transaction is signed. Dedicated crypto devices: Use a separate, clean device exclusively for crypto transactions — reducing the malware attack surface. Regular OS reinstalls. Never install unknown software: Clipboard hijackers are frequently bundled with pirated software, browser extensions, and downloads from unofficial sources.