Specialists in cybersecurity from ICS Sans found an unusual virus-miner with habits of a stout gopnik.
How it works
Externally modified miner is almost not differed from colleagues, but the it has the function " kill list " . FROM her using the virus eliminates competitors in face of other miners, if they also made their way to a computer. Specialists in cyber security say that the creator of the " super-miner " had to do a fantastic job because the competition in this area is now crazy. AND his experience can now be used to combat other official level.
Why it is needed
According to Symantec Threat Intelligence data over the past 5 months, the number of hacker attacks for cryptographic purposes has increased exponentially. The most active hackers operated in the UK, USA, Japan, France and Germany. There, the number of crypto-hacks from October 2017 to February 2018 grew 10-15 times. One of the last major victims was Tesla, in which hackers broke into the cloud storage and installed hidden miners on the servers. Therefore, in such a crowd it is easier to survive if you have a gun. Or " kill list ".
What is the virus miner
This is quite common malware that falls on computer with The back door uses computer hardware for hidden crypto currency. If the program is written with mind and not loads the system on 99%, then the owner of the infected computer may not even suspect of its existence. Download and You can completely install the hidden miner - the program often has the form of a photo, a Word file or links to Google Doc.
Recommendations for protection against viruses-miners are almost the same as for protection against common viruses - do not open suspicious links, update antivirus software, and periodically check the system load using the resource monitor within the operating system.