Collects saved credentials, files, autofill history and cryptocurrency wallets from hacked computers.
Example: Redline
Can paste new text into the victim's clipboard, replacing the text copied by the user. Hackers can use clippers to replace the address to which the cryptocurrency is transferred by a regular user. The address is copied to the clipboard along with their own, which allows an attacker to redirect scheduled transactions to their own wallets.
Example: HackBoss
Unauthorized uses the computing power of the victim device in order to mine cryptocurrency.
Example: Glupteba
A virus that looks like a legitimate program but infiltrates the victim's computer to disrupt, steal, or cause other types of harm.
Example: Trojan Mekotio banking