http://cyber4nuoke44kddgmcpxk76ili67bt56h2bflxc6lnvg7xyto737kqd.onion?product=clipboard-virus-software
To complete the process, the malicious user will add a while loop that will run continuously and will constantly use the get clipboard Function. Going back to our scenario, if we assume that Alice wants to copy and paste Eva’s address, in order to send her a certain amount of Bitcoin. When Chris goes to his wallet and pastes this address, the address which he has pasted is not actually Eva’s address but the address which has been determined by the hacker.