A virus-miner has been detected, which can suppress competitors

Externally modified miner is almost not   differed from   colleagues, but   the   it has the function " kill list " . FROM   her   using the virus eliminates competitors in   face of other miners, if they also made their way to   a computer.

A virus-miner has been detected, which can suppress competitors

Specialists in   cybersecurity from   ICS Sans found an unusual virus-miner with   habits of a stout gopnik.

How it works

Externally modified miner is almost not   differed from   colleagues, but   the   it has the function " kill list " . FROM   her   using the virus eliminates competitors in   face of other miners, if they also made their way to   a computer. Specialists in   cyber security say that the creator of the " super-miner " had to do a fantastic job because the competition in   this area is now crazy. AND   his experience can now be used to combat   other   official level.

Why it is needed

According to Symantec Threat Intelligence data over the past 5 months, the number of hacker attacks for cryptographic purposes has increased exponentially. The most active hackers operated in the UK, USA, Japan, France and Germany. There, the number of crypto-hacks from October 2017 to February 2018 grew 10-15 times. One of the last major victims was Tesla, in which hackers broke into the cloud storage and installed hidden miners on the servers. Therefore, in such a crowd it is easier to survive if you have a gun. Or " kill list ".

What is the virus miner

This is quite common malware that falls on   computer with   The back door uses computer hardware for hidden crypto currency. If the program is written with   mind and   not   loads the system on   99%, then   the owner of the infected computer may not even   suspect of   its existence. Download and   You can completely install the hidden miner   - the program often has the form of a photo, a Word file or links to   Google Doc.

Recommendations for protection against viruses-miners are almost the same as for protection against common viruses - do not open suspicious links, update antivirus software, and periodically check the system load using the resource monitor within the operating system.

Source: bleepingcomputer

Share: