Hackers Recycle old Ransomware for new Crypto Malware

Never Stop Mining...
User avatar
howlermunkey
Site Admin
Contact:
Location: East Coast
Posts: 1271
Joined: Tue Feb 20, 2018 12:04 pm

Hackers Recycle old Ransomware for new Crypto Malware

Sun Sep 09, 2018 12:21 pm

Cybersecurity experts at Fortinet and Kaspersky have discovered new cryptocurrency malware that has been developed using updated versions of known ransomware according to September 5, 2018, reports.

Cryptojacking Malware
If you have been following blockchain media, you will be aware of the aggressive surge in cryptocurrency mining malware that allows hackers to implement code into a website that mines cryptocurrency using each visitors processing power without informing the user. This practice is commonly referred to as “cryptojacking.”

The Monero-mining protocol CoinHive was the first software of this kind when it launched in September 2017. It was developed with the intention of providing website owners with an alternative monetization tool that could replace advertising. However, the CoinHive protocol was almost immediately hijacked by malicious actors who implemented this code into as many websites as possible to make illicit gains in the untraceable digital currency Monero (XMR).

Hackers went as far as to implement the CoinHive code into YouTube Ads to make money from YouTuber users while they watched videos on Google’s popular streaming platform.

As CoinHive is an open-source protocol, newer iterations of the cryptomining software also quickly appeared, which can only be categorized as malware.

Old Ransomware, new Tricks
According to ITPro Today, researchers at Fortinet and Kaspersky have found that hackers have started to take old ransomware and “upgrade” it to either steal cryptocurrency from its victims or mine cryptocurrency using the infected computer.

Kaspersky cybersecurity experts Egor Vasilenko and Orkhan Mamedov explained in a blog post how a trojan that has been around since 2013 has been revamped to now go through a checklist when deployed on its victim’s computer before it decides whether to start mining cryptocurrency on that computer or not.


https://btcmanager.com/hackers-ransomwa ... o-malware/

Return to “Mining”