The cryptojacking. The internet has been very influential in the world in recent years. It has changed the way people live their lives in many aspects. Be it Google Maps, taxi services like Uber or dating sites. When the internet is adopted and integrated into one’s life, along with it, comes the risk of malware. Likewise, even the internet has negative sides and those are known as “malware” (an abbreviated form of malicious software, is a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner. Also, there are various types of malware, including computer worm, computer viruses, Trojan horse, adware, spyware, ransomware, scareware, and backdoor).

 

Recently, an American cybersecurity intelligence company Palo Alto Networks published an article with revelations about a ‘cryptojacking’ malware that just looks like an adobe flash update and conceals itself underneath a fake update.

 

Cryptojacking is a phenomenon where the hacker attacks a user’s device that is used for mining cryptocurrencies without the consent of the user. The device’s computational capacities utilize in this attack.

 

The malware conducts secret mining operations to mine Monero (XMR) by installing “XMRig cryptocurrency miner”. However, Palo Alto’s cyber threat intelligence team unit 42 confirmed this information.

 

The developers of the malware seem to have stolen the pop-up notification from the official Adobe installer. As a result, this makes it particularly dangerous as it does also install the user’s device with the latest version of ‘Flash’. 5 percent of the total Monero supply mined using such malware.

 

“In most cases, fake Flash updates pushing malware are not very stealthy. However, in this instance, because of the latest Flash update, a potential victim may not notice anything out of the ordinary.”

Brad Duncan-Analyst at Unit 42.

 

The Malware detected detection.

 

The unit 42 intelligence tool detected the malware by searching for fake flash updates.

“77 malware samples are identified with a CoinMiner tag in AutoFocus. The remaining 36 samples share other tags with those 77 CoinMiner-related executables.” Said unit 42’s cybersecurity intelligence team.

 

Coin miners used ‘Coinhive’ the Javascript program to mine Monero through a web browser. According to a report by Iran’s cybersecurity, Brazil had the highest number of such attacks. However, India was second and Indonesia was third.  

 

Hence, this is a shocking development especially with sources claiming that the use of such cryptojacking malware has gone up by 500 percent in recent years.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.