Tuesday, January 28, 2025
3 C
New York

Cyber Security Firm Report That Monero-Mining Malware is Evolving

KingMiner is a malware program that hijacks a host computer and diverts the computer's processing power towards mining a cryptocurrency called Monero. This malware infects Windows Servers and uses several ingenious methods to avoid detection. KingMiner was first detected back in June, and new ways were developed to detect its presence, but reports from Check Point Research indicate that the malware has evolved. Sensor logs on the KingMiner botnet are indicating that the number of attacks is increasing while the detection rate is decreasing.

Check Point's findings indicate that the malicious software uses brute force to guess the passwords for the servers that it infects. When an unsuspecting user downloads the Windows Scriptlet file, the malware identifies what kind of CPU the system uses and then downloads a payload file which initiates the covert mining. The malware cleans up after itself by destroying the .exe files it came with along with any older versions that may still exist. Check Point stated that the new version does not use a ZIP file which would have been flagged, but uses XML files instead.

Once the files are downloaded, the malware starts to mine Monero using hijacked processing power. Researchers stated that KingMiner is designed, but in reality, it uses 100%. The researchers could not give an accurate count of how many coins have been mined in this manner due to the privacy features that are a part of Monero's blockchain.

Cryptomining malware has seen a boom that matched with the rising popularity of cryptocurrencies. Kaspersky Labs recently found that botnets, in particular, were sharing a higher number of crypto jacking malware files. 4.6% of all data downloaded by botnets in Q1 of 2018 were malware files similar to KingMiner. That's a rise from 2.9% in Q2 of 2017.

Stay safe out there, use good antivirus software and stay vigilant.

Hot this week

Beware of Fake GitHub Stars

GitHub stars are a quick way to gauge open-source...

Facebook Marketplace Data Leak: 200K Exposed – Act Now

In alarming news, the personal information of approximately 200,000...

IObit Malware Fighter 11 Pro Review: Is It Enough?

  IObit Malware Fighter 11 Pro: Robust Malware Protection, But...

State-Sponsored Weaponization of ChatGPT: AI Turns Cyber Warfare Threat

Artificial intelligence (AI) is rapidly changing the world. We...

Is Your Face at Risk? “Gold Pickaxe” Malware Threatens Your Identity

  The Dangerous New Hack That Could Hijack Your Identity A...

Topics

Beware of Fake GitHub Stars

GitHub stars are a quick way to gauge open-source...

Facebook Marketplace Data Leak: 200K Exposed – Act Now

In alarming news, the personal information of approximately 200,000...

IObit Malware Fighter 11 Pro Review: Is It Enough?

  IObit Malware Fighter 11 Pro: Robust Malware Protection, But...

State-Sponsored Weaponization of ChatGPT: AI Turns Cyber Warfare Threat

Artificial intelligence (AI) is rapidly changing the world. We...

Is Your Face at Risk? “Gold Pickaxe” Malware Threatens Your Identity

  The Dangerous New Hack That Could Hijack Your Identity A...

Krasue Alert: Linux Systems Under Stealth Attack

Linux, synonymous with security and reliability in operating systems,...

Best Free Password Managers 2024: Secure Your Digital Life

As we move into 2024, the reliance on traditional...

Secure Your WordPress: Spot & Stop Fake Alerts!

WordPress is synonymous with website creation, powering a substantial...
spot_img

Related Articles

Popular Categories

spot_imgspot_img