Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’ PCs through pirated software commonly used for work and entertainment, such as photo and text editors, etc. The PCs were then exploited for the creation of cryptocurrencies, with all profits going to the cybercriminals involved.

 

While the cryptocurrency market continues to burst with enormous increases in the number and value of investments, more and more criminals are also keeping an eye on its development. The fact that this excitement has captured so many people plays into their hands, making it easier to cheat general users who are not IT-savvy individuals.

 

or instance, cryptocurrency miners became one of the major trends in 2017, according to the annual Kaspersky Security Bulletin. This trend was predicted last year by Kaspersky Lab researchers who spotted a comeback of mining software amid the growing popularity of Zcash. Just a year later, miners are everywhere.

 

The word “miner” refers both to the people who mine cryptocurrencies and to the programs used to do it.

 

Criminals are using different tools and techniques, such as social engineering campaigns, or by exploiting cracked software, to affect as many PCs as possible.

 

As an example of the latter fraud method, Kaspersky Lab experts have recently discovered a number of similar websites offering ways for users to download free pirated software — popular computers programs and applications.

 

To inspire confidence, criminals have been using domain names similar to real ones. After downloading a piece of software, the user receives an archive that also contains a mining program. This is then installed automatically, together with the desired software.

 

The installation archive includes text files containing initialization information — wallet and mining pool addresses. A mining pool is a server that unites several participants and distributes the mining task among their computers. In exchange, participants receive their share of the cryptocurrency that is being mined much faster than then would if mining only through their own PC.

 

Because of architectural particularities, mining Bitcoins and other cryptocurrencies is currency a very resource-heavy and time-consuming operation, so such pools significantly increase the productivity and speed of cryptocurrency generation.

 

After being installed, miners start to silently operate on the victim’s PC, generating crypto-coins for criminals. According to Kaspersky Lab research, in all cases, they used the NiceHash project software, which recently suffered a major cybersecurity breach resulting in the theft of millions of dollars’ worth of cryptocurrency. Some of the victims were connected to a mining pool of the same name.

 

Experts also have found that some miners contained a special feature that allowed the user to remotely change a wallet number, pool, or miner. This means criminals could set another destination for the cryptocurrency at any time and manage their earnings by distributing mining flows between wallets or even make the victim’s computer work for another mining pool.

 

Although not considered malicious, mining software reduces the device’s system performance, which inevitably affects the user experience in general. Plus it increases the victim’s electricity bill — not a major outcome of being a victim of this fraud scheme, but still an unpleasant one. Of course, some people might be OK with the knowledge than an anonymous person is becoming richer at their expense, but we advise users to resist these attempts as even though it is not being conducted with standard malicious software, it’s still a fraudulent activity ,” says Alexander Kolesnikov, Malware Analyst at Kaspersky Lab.

 

To prevent your PC from becoming a part of a mining network, Kaspersky Lab advises the following:

 

Read more about the newly discovered miners project in the blogpost on Securelist.com.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Realme 3 First Offline Sale a Hit, Saw 900% Growth over Brand’s First Ever In-Store Sale
Techworld Date Posted: 24 April 2019 4:26 PM | 52 Views
After two weeks of back-to-back sold-out sales on Shopee and being hailed the fastest-selling smartphone under Php10,000, the realme 3 successfully lands on the hands of pre-order customers at its first nationwide in-store sale,.... See More
 
Realme 3 First Offline Sale a Hit, Saw 900% Growth over Brand’s First Ever In-Store Sale
Techworld Date Posted: 4:26 PM | 52 Views
After two weeks of back-to-back sold-out sales on Shopee and being hailed the fastest-selling smartphone under Php10,000, the realme 3 successfully lands on the hands of pre-order customers at its first nationwide in-store sale,...See More

 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 28 November 2017 10:24 AM | 310 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. . See More
 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 10:24 AM | 310 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. See More

 
The Numerical Pad: Why so Special
Techworld Date Posted: 31 July 2017 9:32 AM | 272 Views
The numerical pad (which from now on we will call the "numpad") might just seem pretty useful to call center agents, cashiers, and telecomm operators. In computers, we already have numbers above our letter.... See More
 
The Numerical Pad: Why so Special
Techworld Date Posted: 9:32 AM | 272 Views
The numerical pad (which from now on we will call the "numpad") might just seem pretty useful to call center agents, cashiers, and telecomm operators. In computers, we already have numbers above our letter...See More

 
Transcend Offers Lightning-enable Storage Solution, the Perfect Match for iOS Devices
Techworld Date Posted: 23 August 2017 1:44 PM | 332 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, is proud to introduce its bidirectional transmission and storage solution for iOS device users. Transcend's Lightning offerings, crafted for use with iOS.... See More
 
Transcend Offers Lightning-enable Storage Solution, the Perfect Match for iOS Devices
Techworld Date Posted: 1:44 PM | 332 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, is proud to introduce its bidirectional transmission and storage solution for iOS device users. Transcend's Lightning offerings, crafted for use with iOS...See More

 
HyperX Brings Alloy FPS RGB and Cloud Earbuds to PC and Nintendo Switch Gamers
Techworld Date Posted: 29 October 2018 5:13 PM | 169 Views
HyperX®, the gaming division of Kingston Technology, has announced the Alloy FPS RGB Mechanical Gaming Keyboard and the Cloud Earbuds are both available in Malaysia.. See More
 
HyperX Brings Alloy FPS RGB and Cloud Earbuds to PC and Nintendo Switch Gamers
Techworld Date Posted: 5:13 PM | 169 Views
HyperX®, the gaming division of Kingston Technology, has announced the Alloy FPS RGB Mechanical Gaming Keyboard and the Cloud Earbuds are both available in Malaysia.See More

 
Lenovo Continues Support for Youth Organizations, Named Exclusive Technology Partner Anew of TAYO Awards Foundation
Techworld Date Posted: 15 February 2018 5:13 PM | 292 Views
Lenovo, one of the world’s biggest technology companies, is once again the official technology partner of the Ten Accomplished Youth Organizations (TAYO) Awards Foundation, Inc.. See More
 
Lenovo Continues Support for Youth Organizations, Named Exclusive Technology Partner Anew of TAYO Awards Foundation
Techworld Date Posted: 5:13 PM | 292 Views
Lenovo, one of the world’s biggest technology companies, is once again the official technology partner of the Ten Accomplished Youth Organizations (TAYO) Awards Foundation, Inc.See More

 
Meltdown and Spectre Chip Vulnerabilities Could Facilitate Memory Leaks
Techworld Date Posted: 11 January 2018 9:46 AM | 273 Views
Symantec has released the following detection for attempts to exploit the Multiple CPU Hardwares Information Disclosure Vulnerability (CVE-2017-5753/Spectre):. See More
 
Meltdown and Spectre Chip Vulnerabilities Could Facilitate Memory Leaks
Techworld Date Posted: 9:46 AM | 273 Views
Symantec has released the following detection for attempts to exploit the Multiple CPU Hardwares Information Disclosure Vulnerability (CVE-2017-5753/Spectre):See More

 
Chinese-Speaking APT Actor Caught Spying on Pharmaceutical Organizations
Techworld Date Posted: 15 March 2018 11:36 AM | 696 Views
Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more and more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has.... See More
 
Chinese-Speaking APT Actor Caught Spying on Pharmaceutical Organizations
Techworld Date Posted: 11:36 AM | 696 Views
Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more and more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has...See More

 
Proactively Addressing New Cyber Threat Trends in Healthcare
Techworld Date Posted: 30 January 2019 1:19 PM | 116 Views
Most cybercriminal behavior can be reduced to two basic economic drivers. The first is to look for targets with valuable resources that can be easily turned into profits.. See More
 
Proactively Addressing New Cyber Threat Trends in Healthcare
Techworld Date Posted: 1:19 PM | 116 Views
Most cybercriminal behavior can be reduced to two basic economic drivers. The first is to look for targets with valuable resources that can be easily turned into profits.See More

 
DJI Develops Option for Pilots to Fly Without Internet Data Transfer
Techworld Date Posted: 16 August 2017 3:00 PM | 334 Views
DJI, the world's leader in civilian drones and aerial imaging technology, is developing a new local data mode that stops internet traffic to and from its flight control apps, in order to provide enhanced.... See More
 
DJI Develops Option for Pilots to Fly Without Internet Data Transfer
Techworld Date Posted: 3:00 PM | 334 Views
DJI, the world's leader in civilian drones and aerial imaging technology, is developing a new local data mode that stops internet traffic to and from its flight control apps, in order to provide enhanced...See More


Power by

Download Free AZ | Free Wordpress Themes