Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’ PCs through pirated software commonly used for work and entertainment, such as photo and text editors, etc. The PCs were then exploited for the creation of cryptocurrencies, with all profits going to the cybercriminals involved.

 

While the cryptocurrency market continues to burst with enormous increases in the number and value of investments, more and more criminals are also keeping an eye on its development. The fact that this excitement has captured so many people plays into their hands, making it easier to cheat general users who are not IT-savvy individuals.

 

or instance, cryptocurrency miners became one of the major trends in 2017, according to the annual Kaspersky Security Bulletin. This trend was predicted last year by Kaspersky Lab researchers who spotted a comeback of mining software amid the growing popularity of Zcash. Just a year later, miners are everywhere.

 

The word “miner” refers both to the people who mine cryptocurrencies and to the programs used to do it.

 

Criminals are using different tools and techniques, such as social engineering campaigns, or by exploiting cracked software, to affect as many PCs as possible.

 

As an example of the latter fraud method, Kaspersky Lab experts have recently discovered a number of similar websites offering ways for users to download free pirated software — popular computers programs and applications.

 

To inspire confidence, criminals have been using domain names similar to real ones. After downloading a piece of software, the user receives an archive that also contains a mining program. This is then installed automatically, together with the desired software.

 

The installation archive includes text files containing initialization information — wallet and mining pool addresses. A mining pool is a server that unites several participants and distributes the mining task among their computers. In exchange, participants receive their share of the cryptocurrency that is being mined much faster than then would if mining only through their own PC.

 

Because of architectural particularities, mining Bitcoins and other cryptocurrencies is currency a very resource-heavy and time-consuming operation, so such pools significantly increase the productivity and speed of cryptocurrency generation.

 

After being installed, miners start to silently operate on the victim’s PC, generating crypto-coins for criminals. According to Kaspersky Lab research, in all cases, they used the NiceHash project software, which recently suffered a major cybersecurity breach resulting in the theft of millions of dollars’ worth of cryptocurrency. Some of the victims were connected to a mining pool of the same name.

 

Experts also have found that some miners contained a special feature that allowed the user to remotely change a wallet number, pool, or miner. This means criminals could set another destination for the cryptocurrency at any time and manage their earnings by distributing mining flows between wallets or even make the victim’s computer work for another mining pool.

 

Although not considered malicious, mining software reduces the device’s system performance, which inevitably affects the user experience in general. Plus it increases the victim’s electricity bill — not a major outcome of being a victim of this fraud scheme, but still an unpleasant one. Of course, some people might be OK with the knowledge than an anonymous person is becoming richer at their expense, but we advise users to resist these attempts as even though it is not being conducted with standard malicious software, it’s still a fraudulent activity ,” says Alexander Kolesnikov, Malware Analyst at Kaspersky Lab.

 

To prevent your PC from becoming a part of a mining network, Kaspersky Lab advises the following:

 

Read more about the newly discovered miners project in the blogpost on Securelist.com.


RECOMMENDED ARTICLE FOR TECHWORLD


 
PLDT Offers Lowest Call Rate to All Networks
Techworld Date Posted: 12 April 2017 2:25 PM | 188 Views
Leading telecoms and digital services provider, PLDT, introduces its lowest call plan offer, the All Net Fam Call 299, starting April. The All Net Fam Call 299 allows subscribers to make 100 minutes of landline.... See More
 
PLDT Offers Lowest Call Rate to All Networks
Techworld Date Posted: 2:25 PM | 188 Views
Leading telecoms and digital services provider, PLDT, introduces its lowest call plan offer, the All Net Fam Call 299, starting April. The All Net Fam Call 299 allows subscribers to make 100 minutes of landline...See More

 
DJI Develops Option for Pilots to Fly Without Internet Data Transfer
Techworld Date Posted: 16 August 2017 3:00 PM | 233 Views
DJI, the world's leader in civilian drones and aerial imaging technology, is developing a new local data mode that stops internet traffic to and from its flight control apps, in order to provide enhanced.... See More
 
DJI Develops Option for Pilots to Fly Without Internet Data Transfer
Techworld Date Posted: 3:00 PM | 233 Views
DJI, the world's leader in civilian drones and aerial imaging technology, is developing a new local data mode that stops internet traffic to and from its flight control apps, in order to provide enhanced...See More

 
Elevate Creativity and Collaboration with Microsoft Office 2019
Techworld Date Posted: 26 October 2018 4:06 PM | 80 Views
Premier Apple partner Power Mac Center, together with tech giant Microsoft, launched the Microsoft Office 2019 products, letting users explore advanced tools and functions excellent for creating top-notch school projects and engaging work presentations.... See More
 
Elevate Creativity and Collaboration with Microsoft Office 2019
Techworld Date Posted: 4:06 PM | 80 Views
Premier Apple partner Power Mac Center, together with tech giant Microsoft, launched the Microsoft Office 2019 products, letting users explore advanced tools and functions excellent for creating top-notch school projects and engaging work presentations...See More

 
Cybersecurity Past and Future What’s Come This Year and What is Coming
Techworld Date Posted: 11 January 2018 9:32 AM | 217 Views
You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too:. See More
 
Cybersecurity Past and Future What’s Come This Year and What is Coming
Techworld Date Posted: 9:32 AM | 217 Views
You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too:See More

 
UBTECH Robotics Introduces the Alpha1 Pro Humanoid Robot to Philippines
Techworld Date Posted: 28 September 2017 4:33 PM | 255 Views
UBTECH Robotics, the company best known globally as the industry leader in artificial intelligence and humanoid robotics today introduced the Alpha1 Pro interactive consumer robot in the Philippines. Alpha1 Pro is a household programmable humanoid.... See More
 
UBTECH Robotics Introduces the Alpha1 Pro Humanoid Robot to Philippines
Techworld Date Posted: 4:33 PM | 255 Views
UBTECH Robotics, the company best known globally as the industry leader in artificial intelligence and humanoid robotics today introduced the Alpha1 Pro interactive consumer robot in the Philippines. Alpha1 Pro is a household programmable humanoid...See More

 
Synology® Unveils Surveillance Station 8.2 to Liberate Phone-Based Surveillance
Techworld Date Posted: 26 October 2018 4:28 PM | 42 Views
Synology Inc. recently announced Surveillance Station 8.2. Locally available in the Philippines, this release showcases LiveCam, a brand new security camera app that instantly turns a spare phone into an IP camera.. See More
 
Synology® Unveils Surveillance Station 8.2 to Liberate Phone-Based Surveillance
Techworld Date Posted: 4:28 PM | 42 Views
Synology Inc. recently announced Surveillance Station 8.2. Locally available in the Philippines, this release showcases LiveCam, a brand new security camera app that instantly turns a spare phone into an IP camera.See More

 
Five Short YouTube Docus That Deserve a Spot on Your Playlist Right Now
Techworld Date Posted: 15 September 2018 2:32 PM | 153 Views
In between life hacks and viral videos, YouTube has an exciting selection of thought-provoking documentaries and informative videos that are just as entertaining as they are enlightening.. See More
 
Five Short YouTube Docus That Deserve a Spot on Your Playlist Right Now
Techworld Date Posted: 2:32 PM | 153 Views
In between life hacks and viral videos, YouTube has an exciting selection of thought-provoking documentaries and informative videos that are just as entertaining as they are enlightening.See More

 
NukeBot: New Ready-to-Attack Version of Dangerous Banking Trojan Caught in the Wild
Techworld Date Posted: 24 July 2017 2:45 PM | 204 Views
Kaspersky Lab researchers have detected NukeBot – new malware which has been designed to steal the credentials of online banking customers. Earlier versions of the Trojan were known to the security industry as TinyNuke,.... See More
 
NukeBot: New Ready-to-Attack Version of Dangerous Banking Trojan Caught in the Wild
Techworld Date Posted: 2:45 PM | 204 Views
Kaspersky Lab researchers have detected NukeBot – new malware which has been designed to steal the credentials of online banking customers. Earlier versions of the Trojan were known to the security industry as TinyNuke,...See More

 
Concern for Online Security of Our Older Relatives not Converting into Care, Warns Kaspersky Lab
Techworld Date Posted: 15 May 2018 4:52 PM | 324 Views
It’s well documented that younger generations are spending a greater proportion of their lives online, but they’re not the only ones.. See More
 
Concern for Online Security of Our Older Relatives not Converting into Care, Warns Kaspersky Lab
Techworld Date Posted: 4:52 PM | 324 Views
It’s well documented that younger generations are spending a greater proportion of their lives online, but they’re not the only ones.See More

 
Boost Your Office Network with the DAP-2230 Wireless N PoE Access Point
Techworld Date Posted: 31 August 2017 3:36 PM | 208 Views
Manila, Philippines - Building a business system isn't easy-building one that's robustly connected is even harder. Today's tech-savvy world means that businesses need to step up their game constantly in order to beat the.... See More
 
Boost Your Office Network with the DAP-2230 Wireless N PoE Access Point
Techworld Date Posted: 3:36 PM | 208 Views
Manila, Philippines - Building a business system isn't easy-building one that's robustly connected is even harder. Today's tech-savvy world means that businesses need to step up their game constantly in order to beat the...See More


Power by

Download Free AZ | Free Wordpress Themes