Connect with us

Hi, what are you looking for?

HEADLINES

Cybercriminals use pirated software to secretly infect PCs for cryptocurrency mining

Kaspersky Lab researchers identified a fraud scheme where mining software was distributed and secretly installed on users’ PCs through pirated software commonly used for work and entertainment, such as photo and text editors, etc. The PCs were then exploited for the creation of cryptocurrencies, with all profits going to the cybercriminals involved.  

Kaspersky Lab researchers identified a fraud scheme where mining software was distributed and secretly installed on users’ PCs through pirated software commonly used for work and entertainment, such as photo and text editors, etc. The PCs were then exploited for the creation of cryptocurrencies, with all profits going to the cybercriminals involved.  

While the cryptocurrency market continues to burst with enormous increases in the number and value of investments, more and more criminals are also keeping an eye on its development. The fact that this excitement has captured so many people plays into their hands, making it easier to cheat general users who are not IT-savvy individuals.

For instance, cryptocurrency miners became one of the major trends in 2017, according to the annual Kaspersky Security Bulletin. This trend was predicted last year by Kaspersky Lab researchers who spotted a comeback of mining software amid the growing popularity of Zcash. Just a year later, miners are everywhere.

The word “miner” refers both to the people who mine cryptocurrencies and to the programs used to do it.

Advertisement. Scroll to continue reading.

Criminals are using different tools and techniques, such as social engineering campaigns, or by exploiting cracked software, to affect as many PCs as possible.

As an example of the latter fraud method, Kaspersky Lab experts have recently discovered a number of similar websites offering ways for users to download free pirated software — popular computers programs and applications.

To inspire confidence, criminals have been using domain names similar to real ones. After downloading a piece of software, the user receives an archive that also contains a mining program. This is then installed automatically, together with the desired software.

The installation archive includes text files containing initialization information — wallet and mining pool addresses. A mining pool is a server that unites several participants and distributes the mining task among their computers. In exchange, participants receive their share of the cryptocurrency that is being mined much faster than then would if mining only through their own PC.

Because of architectural particularities, mining Bitcoins and other cryptocurrencies is currency a very resource-heavy and time-consuming operation, so such pools significantly increase the productivity and speed of cryptocurrency generation.

Advertisement. Scroll to continue reading.

After being installed, miners start to silently operate on the victim’s PC, generating crypto-coins for criminals. According to Kaspersky Lab research, in all cases, they used the NiceHash project software, which recently suffered a major cybersecurity breach resulting in the theft of millions of dollars’ worth of cryptocurrency. Some of the victims were connected to a mining pool of the same name.

Experts also have found that some miners contained a special feature that allowed the user to remotely change a wallet number, pool, or miner. This means criminals could set another destination for the cryptocurrency at any time and manage their earnings by distributing mining flows between wallets or even make the victim’s computer work for another mining pool.

“Although not considered malicious, mining software reduces the device’s system performance, which inevitably affects the user experience in general. Plus it increases the victim’s electricity bill — not a major outcome of being a victim of this fraud scheme, but still an unpleasant one. Of course, some people might be OK with the knowledge than an anonymous person is becoming richer at their expense, but we advise users to resist these attempts as even though it is not being conducted with standard malicious software, it’s still a fraudulent activity ,” says Alexander Kolesnikov, Malware Analyst at Kaspersky Lab.

To prevent your PC from becoming a part of a mining network, Kaspersky Lab advises the following:

  • Download only legal software from proven sources
  • Install a reliable security solution such as Kaspersky Internet Security that protects you from all possible threats, including malicious mining software

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

ELECTRONICS

Philips EasyKey partnered with Megaworld and equipped their world-class properties with only the best-in-class smart locks we have on offer, the Philips EasyKey 9300.

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

HEADLINES

Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial...

HEADLINES

Smart has received reports about unscrupulous individuals pretending to be company executives or representatives of organizations asking for donations for made-up or nonexistent relief...

HEADLINES

Located in the Kaspersky office, the new facility will provide the company’s stakeholders with services ranging from an overview of Kaspersky’s practices, to a...

HEADLINES

Smart and Maya emphasize that they never send SMS with links requesting login credentials, personal information, or account verification. If you receive such a...

Advertisement