lyudik.rofd.io
Contact me

Growth · 2 min read

"Paste Address" — The Clipboard Attack Vector

📋 "Paste Address" — The Clipboard Attack Vector
Clipboard-swapping malware monitors for cryptocurrency address patterns. User copies legitimate address, malware substitutes attacker address, user pastes without verification. Funds gone.
This attack vector is documented extensively in Kaspersky, Malwarebytes, and ESET threat intelligence reports. The ClipBanker malware family alone has been attributed to $10M+ in losses. The attack succeeds because 42-character hex strings are impossible for humans to verify character-by-character, and users have been trained to trust copy-paste operations.
The verification problem is cognitive, not technical. Research on human pattern recognition—referenced in security UX literature from Lorrie Cranor's work at CMU—shows that people cannot reliably compare long alphanumeric strings. We're wired for pattern recognition, not character-by-character comparison.
Design interventions that work with human cognition:
→ Prominent first/last 6 character display. The probability of malware generating a collision on first AND last 6 characters is computationally infeasible. This pattern is standard in ENS, Etherscan, and most wallet interfaces.
→ Visual identicons generated deterministically from address. Blockies, Jazzicons, and similar libraries create unique visual representations. Users learn to recognize their frequently-used addresses by shape and color, not by string comparison.
→ Address book with "sent before" confirmation. "You've sent to this address 7 times. Last transaction: 3 days ago." provides social proof that the address is legitimate for this user's context.
ENS adoption data supports visual verification: domains with visual identity indicators show 67% lower fraud report rates compared to raw address interactions according to ENS Labs' public metrics.
The clipboard is hostile territory. Design for verification, not trust.
→ MayWap | Building clipboard-safe address UX