Zafu Security Guide · April 2026 · 6 min read

How Clipboard Hijacking Works in Crypto

Clipboard hijacking malware monitors your clipboard and silently swaps any cryptocurrency address you copy with an attacker's address — before you paste. The replacement is invisible. The loss is permanent. Here's exactly how it works and how to stop it.

The direct answer

When you copy a crypto address, that address lives in your operating system's clipboard until you paste it. Clipboard hijacking malware sits in the background, watching. The moment it sees a crypto address pattern (42 hex characters for EVM, base58 for Solana), it replaces it with the attacker's address — instantly, silently. You paste, the wallet auto-fills, and you send funds to the attacker's wallet.

By the time you notice, the transaction is confirmed and irreversible.

Scale: Clipboard hijackers drained an estimated $713 million via browser-based attacks in 2025 alone. Hundreds of malware families include clipboard monitoring as a standard feature.

Step-by-step: what happens during an attack

Why it's impossible to detect visually

Here's what a clipboard hijack looks like on screen:

What you copied
COPIED 0x71C7656EC7ab88b098defB751B7401B5f6d8976F
What you pasted (after hijack)
HIJACKED 0x71C7656EC7ab88b098defB751B7401B5f6a19e2C

The addresses are the same length. Both start with 0x71C7. Both pass checksum validation. A human glancing at the paste field has zero chance of catching the replacement. Even if you check the first and last few characters — the standard "quick check" — a targeted hijacker can generate a replacement address that matches your intended recipient's prefix and suffix.

How attackers build clipboard hijackers

Clipboard monitoring is a standard OS feature — SetClipboardViewer on Windows, NSPasteboard callbacks on macOS. Any program can register as a clipboard listener. Crypto-targeting hijackers add a regex filter and a wallet address lookup table. The total code is under 100 lines in most malware families.

More sophisticated variants pre-generate vanity addresses that share the first 6 and last 4 characters with popular exchange deposit addresses — so even a careful user who does a partial check gets fooled.

Common delivery vectors

How Zafu detects clipboard hijacking

Detection method: Zafu records the address you copied and intercepts every crypto-address paste before it reaches the input field. If the pasted address differs from the copied address, Zafu fires a HIJACKED warning and shows exactly which characters changed. The paste is blocked. You stay in control.

This works because Zafu operates at the paste event — the exact moment the hijacked address would enter your wallet. The comparison is deterministic: if copied !== pasted (same chain family), the HIJACKED state fires unconditionally.

Unlike antivirus software that tries to detect malware at install time, Zafu catches the hijack at the point of harm — regardless of which malware family performed the replacement, when it was installed, or whether any scanner has seen it before.

Frequently asked questions

Does clipboard hijacking only affect crypto?

No, but crypto is the primary target because transactions are irreversible and instant. The same technique is theoretically usable against bank routing numbers or email addresses, but the irreversibility of crypto makes it uniquely profitable for attackers.

Can a hardware wallet protect against clipboard hijacking?

Partially. A hardware wallet prompts you to verify the destination address on the device screen. If you check the device screen, you can catch the hijack. But many users skip the verification step or compare the wrong characters. Zafu catches it before the address reaches the wallet UI at all.

Is clipboard hijacking the same as address poisoning?

No. Clipboard hijacking uses malware on your device to replace an address you copied. Address poisoning plants a lookalike address in your transaction history so you copy the wrong address yourself. Both attack the paste moment — Zafu catches both with separate detection checks.

Does Zafu read my clipboard in the background?

Zafu only reads clipboard content during a paste event on a wallet or exchange page. It does not continuously monitor your clipboard. The copied address is stored only in browser session storage (cleared when you close the browser) and is never sent to any server.

What chains does Zafu protect?

Zafu detects clipboard hijacking for both EVM addresses (Ethereum, Polygon, Arbitrum, Base, and all EVM-compatible chains) and Solana addresses. ENS name resolution is also supported.

Stop clipboard hijacking before it costs you.

Free Chrome extension. No wallet access. Works across wallet and exchange websites.

Add to Chrome — Free

Also catches address poisoning, scam addresses, and community-flagged threats.