Hacker Arrested in KMSAuto Clipper Malware Campaign Targeting Cryptocurrency

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A Lithuanian national has been arrested in connection with a large-scale KMSAuto clipper malware campaign. The 29-year-old suspect was apprehended in Georgia in a international law enforcement action and subsequently extradited to South Korea following a multi-year investigation coordinated through Interpol. 

The operation targeted users of KMSAuto, an illegal tool for activating unlicensed copies of Microsoft Windows and Office. The individual is accused of distributing clipper malware disguised as the tool, leading to the infection of approximately 2.8 million systems globally between April 2020 and January 2023.

Technical Details of the Clipper Malware Attack

The campaign's primary threat vector was clipper malware, a type of malicious software designed to monitor a system's clipboard. When a user copies a cryptocurrency wallet address to paste into a transaction, the malware automatically replaces it with an address controlled by the attacker.

Police report excerpt (auto-translated)
Police report excerpt (auto-translated) | Source: Korean Police

The Korean National Police Agency reported that this scheme facilitated approximately 8,400 fraudulent transactions from about 3,100 unique cryptocurrency addresses belonging to victims from 234 countries worldwide, including South Korea.

The campaign resulted in the theft of virtual assets valued at approximately 1.7 billion won ($1.2 million). Eight Koreans were confirmed to have suffered a total of 16 million won in damages.

Enforcement Action and Cryptocurrency Theft Recovery

The investigation began in August 2020 after reports of cryptojacking led authorities to the malicious KMSAuto tool, the police report said. 

Law enforcement conducted a raid in Lithuania in December 2024, seizing 22 items, including laptops and mobile phones containing incriminating evidence. This led to the final arrest in April 2025. 

Authorities warn that using illegal software activation tools carries substantial risk, as they are a common vector for malware distribution. Users are strongly advised to avoid unofficial software and only use executables from trusted sources.

In September, an advanced cryptojacking campaign used an obfuscated AutoIt Loader to deliver NBMiner.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: