Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

The Threat of Crypto-Currency Mining Malware

 

CheckPoint Software a provider of cyber-security solutions cautions about threat from malicious software 'CoinHive' that mines crypto-currency and which's growing rapidly.

 

A new report titled "Global Threat Impact Index Report" from the company states that CoinHive graduated to rank no.6 among the most-used malicious programs during October. Functioning like JavaScript, the CoinHive malware hangs about on websites out of visitors' sight and eats into their computers' processing power so it can mine Monero.

 

According to Manager Maya Horowitz of CheckPoint's Threat Intelligence Group, with CoinHive and other mining malware appearing online it becomes necessary to introduce sophisticated methodologies of threat prevention that would lessen the practices of crypto-currency mining by cyber-criminals and provide safeguards for networks.

 

Crooks mining crypto-currencies rely on victims' hardware resources in considerable amount leading to drastically increased energy usage while at the same time substantial lowering of device usability. Thus, users lately noticing slow running of their devices while getting outrageously high energy bills, should become alert of potential crypto-currency mining malicious program stamping its impact on their systems. Experts have tips to ensure knowledge of such malware's infection and the ways for preventing their harm to users' devices. Knowtechie.com posted this, November 14, 2017.

 

Crypto-currencies count to over 700 and these aren't obtainable from financial institutions or governments, while just a limited numbers are readily traded. The foremost crypto-currency in use was Bitcoin; however, some more widely-used followed such as Monero, Dogecoin and Litecoin. For developing crypto-currencies, one distinct cryptographic algorithm is required for each crypto-currency. This algorithm is kept intact via a PC-network alternatively specially characterized hardware which treats the involved transaction as well as validates it to be popularly described as mining.

 

Of late Cloudflare a supplier of Internet domain shutdown websites, which harbored secretly running crypto-currency miners, one of them being the torrent website, 'ProxyBunker's' operator. Notably, malware for mining is getting increasingly refined. A few such malware programs pauses their activity whilst PC-operators do intensive tasks alternatively check their system reserves both making the malware's detection still harder. Such mining malware give more opportunities to criminals towards continuation of the programs' proliferation while profit without any risk.

» SPAMfighter News - 11/20/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next