{"id":54066,"date":"2025-08-08T05:02:56","date_gmt":"2025-08-08T09:02:56","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54066"},"modified":"2025-08-08T05:02:56","modified_gmt":"2025-08-08T09:02:56","slug":"efimer-trojan-steals-crypto","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/efimer-trojan-steals-crypto\/54066\/","title":{"rendered":"Efimer Trojan using hacked websites to steal cryptocurrency"},"content":{"rendered":"<p>If you\u2019re an active cryptocurrency user but you\u2019re still downloading torrent files and aren\u2019t sure how to safely store your seed phrases, we\u2019ve some bad news for you. We\u2019ve discovered a new Trojan, Efimer, that replaces crypto wallet addresses right in your clipboard. One click is all it takes for your money to end up in a hacker\u2019s wallet.<\/p>\n<p>Here\u2019s what you need to do to keep your crypto safe.<\/p>\n<h2>How Efimer spreads<\/h2>\n<p>One of Efimer\u2019s main distribution channels is WordPress websites. It doesn\u2019t help that WordPress is a free content-management system for websites \u2014 or that it\u2019s the world\u2019s <a href=\"https:\/\/www.wpzoom.com\/blog\/wordpress-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">most popular<\/a>. Everyone from small-time bloggers and businesses to major media outlets and corporations uses it. Scammers exploit poorly secured sites and publish posts with infected torrent files.<\/p>\n<div id=\"attachment_54071\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/08\/08034453\/efimer-trojan-steals-crypto-01.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54071\" class=\"size-large wp-image-54071\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/08\/08034453\/efimer-trojan-steals-crypto-01-1024x824.png\" alt=\"This is what a hacked WordPress website infected with Efimer looks like\" width=\"1024\" height=\"824\"><\/a><p id=\"caption-attachment-54071\" class=\"wp-caption-text\">This is what a hacked WordPress website infected with Efimer looks like<\/p><\/div>\n<p>When a user downloads a torrent file from an infected site, they get a small folder that contains what looks like a movie file with the .xmpeg extension. You can\u2019t open a file in that format without a \u201cspecial media player\u201d, which is conveniently included in the folder. In reality, the \u201cplayer\u201d is a Trojan installer.<\/p>\n<div id=\"attachment_54070\" style=\"width: 693px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/08\/08034359\/efimer-trojan-steals-crypto-02.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54070\" class=\"wp-image-54070 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/08\/08034359\/efimer-trojan-steals-crypto-02.png\" alt=\"The torrent folder with the malicious files inside\" width=\"683\" height=\"202\"><\/a><p id=\"caption-attachment-54070\" class=\"wp-caption-text\">The torrent folder with the malicious files inside<\/p><\/div>\n<p>Recently, Efimer has also started spreading through phishing emails. Website and domain owners receive emails, purportedly from lawyers, falsely claiming copyright infringement and demanding content removal. The emails say all the details are in the attachment\u2026\u00a0which is actually where the Trojan is lurking. Even if you don\u2019t own a website yourself, you can still receive spam email messages with Efimer attached. Threat actors collect user email addresses from WordPress sites they\u2019ve previously compromised. So, if you get an email like this, whatever you \u2014 don\u2019t open the attachment.<\/p>\n<h2>How Efimer steals your crypto<\/h2>\n<p>Once Efimer infects a device, one of its scripts adds itself to the Windows Defender exclusion list \u2014 provided the user has administrator privileges. The malware then installs a <a href=\"https:\/\/www.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/52549\/\" target=\"_blank\" rel=\"noopener nofollow\">Tor<\/a> client to communicate with its command-and-control server.<\/p>\n<p>Efimer accesses the clipboard and searches for a seed phrase, which is a unique sequence of words that allows access to a crypto wallet. The Trojan saves this phrase and sends it to the attackers\u2019 server. If it also finds a crypto wallet address in the clipboard, Efimer discreetly swaps it out for a fake one. To avoid raising suspicion, the fake address is often very similar to the original. The end result is that cryptocurrency is silently transferred to the cybercrooks.<\/p>\n<p>Wallets containing Bitcoin, Ethereum, Monero, Tron, or Solana are primarily at risk, but owners of other cryptocurrencies shouldn\u2019t let their guard down. The developers of Efimer regularly update the malware by adding new scripts and extending support for more crypto wallets. You can find out more about Efimer\u2019s capabilities in our analysis on <a href=\"https:\/\/securelist.com\/efimer-trojan\/117148\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>.<\/p>\n<h2>Who\u2019s at risk?<\/h2>\n<p>The Trojan is attacking Windows users all over the world. Currently the malware is most active in Brazil, Russia, India, Spain, Germany, and Italy, but the scope of these attacks could easily expand to your country, if it\u2019s not already on the list. Users of crypto wallets, owners of WordPress sites, and those who frequently download movies, games, and torrent files from the internet should be especially vigilant.<\/p>\n<h2>How to protect yourself from Efimer<\/h2>\n<p>The Efimer Trojan is a real jack-of-all-trades. It\u2019s capable of stealing cryptocurrencies, swapping crypto wallets, and it poses a serious threat to both individuals and organizations. It can use scripts to hack WordPress sites, and is able to spread on its own. However, in every case, a device can only be infected if the potential victim downloads and opens a malicious file themselves. This means that a little vigilance and a healthy dose of caution \u2014 ignoring files from suspicious sources at the very least \u2014 is your best defense against Efimer.<\/p>\n<p>Here are our recommendations for home users:<\/p>\n<ul>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">robust security solution<\/a>\u00a0that can scan files for malware and warn you against opening phishing links.<\/li>\n<li>Create unique and <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">strong passwords<\/a>. And no, storing them in your notes app is not a good idea. Make sure you use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> to sign in to crypto wallets and websites.<\/li>\n<li>Avoid downloading movies or games from unverified sites. Pirated content is often <a href=\"https:\/\/www.kaspersky.com\/blog\/malware-in-pirated-games-2021\/41352\/\" target=\"_blank\" rel=\"noopener nofollow\">crawling<\/a> with all kinds of Trojans. Even if you choose to take that risk, pay close attention to the file extensions. A regular video file definitely won\u2019t have an .exe or .xmpeg extension.<\/li>\n<li>Don\u2019t store your seed phrases in plain text files. Trust a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>.\u00a0Read <a href=\"https:\/\/www.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/53155\/\" target=\"_blank\" rel=\"noopener nofollow\">this article<\/a> to learn more about how to protect your cryptocurrency assets.<\/li>\n<\/ul>\n<blockquote><p>What other threats lurk in the crypto world:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/53155\/\" target=\"_blank\" rel=\"noopener nofollow\">Lessons from the Bybit hack: how to store crypto safely<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/cryptowallet-free-seed-phrase-scam\/52810\/\" target=\"_blank\" rel=\"noopener nofollow\">You found a seed phrase from someone else\u2019s cryptowallet: what could go wrong?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/53675\/\" target=\"_blank\" rel=\"noopener nofollow\">Your cat pics are at risk: the threat posed by the new SparkKitty Trojan<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/google-forms-scam\/53909\/\" target=\"_blank\" rel=\"noopener nofollow\">Beware of Google Forms bearing crypto gifts<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve uncovered a new Trojan \u2014 Efimer \u2014 which steals cryptocurrency via the clipboard. Here&#8217;s how it functions, and how you can stay protected.<\/p>\n","protected":false},"author":2706,"featured_media":54067,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[374,2640,2713,76,3244,422,723],"class_list":{"0":"post-54066","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-cryptocurrencies","10":"tag-ethereum","11":"tag-phishing","12":"tag-stealers","13":"tag-threats","14":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/efimer-trojan-steals-crypto\/54066\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/efimer-trojan-steals-crypto\/29381\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/efimer-trojan-steals-crypto\/24495\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/efimer-trojan-steals-crypto\/29329\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/efimer-trojan-steals-crypto\/40254\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/efimer-trojan-steals-crypto\/29546\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/efimer-trojan-steals-crypto\/35248\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/efimer-trojan-steals-crypto\/34896\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cryptocurrencies\/","name":"cryptocurrencies"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54066"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54066\/revisions"}],"predecessor-version":[{"id":54073,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54066\/revisions\/54073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54067"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}