Video uploaded by UFD Tech on May 21, 2018
Cryptocurrency has been around for a fairly good amount of time before it got in the spotlight. Most users only heard about cryptocurrency last year when the ransomware WannaCry crippled half of the networks of the world. The cyber criminals behind the attack demanded their ransom in Bitcoins. Soon after that, the Bitcoin bubble happened and cryptocurrency became a very popular word. Though it did turn out that the Bitcoin and any other digital ‘coin’ for that matter is very volatile. Mining the cryptocurrency pays more than simply extorting it. There were also other digital coins that appeared like Monero, for example, that is easier to mine even on weak machines. As a result of this, by the end of 2017 the share of ransomwares dropped significantly from 70% of all malwares to less than 5%.
On the other hand, the share of cryptocurrency mining malwares boosted beyond 60% and is now considered to be the main security threat. It’s lightweight, easy to configure and penetrates into practically any software across all platforms. A devious hacker can infest millions of computers, smartphones, and so on and make them mine cryptocurrency. Any ransomware is mostly a shot in the dark. The victim can be too poor or too experienced to pay the ransom. While cryptojacking yields a more consistent profit. Malware runs inconspicuously and users of the plagued devices may not even know that they have been hacked. According to some experts, more than 55% of organizations across the world are hit by some kind of mining malware.
Most cryptojacking malwares use built-in vulnerabilities of the operating system like Eternal Blue in Windows 10. Others exploit ‘holes’ in web-browsers. The competition in this criminal business is so high that one mining malware labelled GhostMiner uses to delete any other mining malwares in the system before installing.
So what is actually dangerous about cryptocurrency mining malware? You should know that the mining process is highly demanding. Usually, cryptocurrency mining rigs feature the state-of-the-art CPUs, GPUs and cooling systems to cool the hardware because it radiates a lot of heat. In case there is mining malware, perpetrators use the vast army of infested devices or botnets, exploiting other people’s computers or mobile devices. If their CPUs collapse or burn down the motherboard, it is so much the worse for them.
The cryptocurrency mining malware Loapi discovered around Christmas 2017 becomes so demanding that the infested smartphone’s battery just bulges. Loapi is mining Monero, bombarding users with ads and is capable of deleting any antivirus app that can detect its’ activity. No wonder the internals of the hard working handheld are heated so hard that the battery bursts.
With the arising of the Internet of Things (IoT) hackers turned their attention to home appliances and devices with the ‘smart-’ affix. Technically all smart devices are even more vulnerable than smartphones, because they aren’t designed for such work loads. A compromised smart device can cause a short circuit or just melt down because of overheating. It’s a real threat to both our online and offline security. It has been newly reported that the major house builder Lennar is cooperating with Amazon to install Alexa smart microphones in new houses. The microphones will come in set with smart door locks, thermostats and light switches. Can you even imagine what can happen if a crypto mining malware plagues into the house control center?
We are not talking about legal crypto miners that ask for an opt-in from a user if you visit a website where it’s installed. After all, it’s your free choice to download this software or not. We are talking about stealth malwares that grasp control of your electronic devices without your knowledge or consent. Creating, delivering and exploiting these malwares is a crime and should be punishable according to laws. The problem is that the perpetrators are hard to track down and arrest. The threat of arrest is not high enough to stop the incoming tide of the cryptocurrency mining malwares.
That’s why we stress again the importance of using reliable antiviruses with the online activity tracking turned on.The AV can warn you against a phishing or a suspicious website. Here’s a list of symptoms that your PC/laptop or smartphone/tablet may have, if there is a mining malware aboard:
Thousands of Scams on WhatsApp: They Impersonate the Voices of Your Parents and Best Friends,…
Credential Stuffing: Increasingly Devastating in France This formidable technique explains the surge in cyberattacks in…
Mysterious Case: Users Report Hearing Strange Voices on Their iPhones Affected phones may have privacy…
Xiaomi Announced Poco C75 Mid-range Smartphone The Poco C75 is a newly announced mid-range smartphone…
Meta Conducts Tests to Implement Facial Recognition Technology Meta, the company behind social media platforms…
The 5 Best Apple Intelligence Features You Can Try in iOS 18.1: Experience Apple Intelligence…