Check Point software detects that "KingMiner" Crypojacking malware is evolving among cryptographic robots

[ad_1]
Just-When - thought-it-was-safe-to-go-Into-Mining-New-Mining-Malware-Seen-to-Evolve-According-to-researchers

Just when you thought it was safe to go to the mine: new mining malware seen to "evolve" according to the researchers

According to new research by the Israeli cybersecurity company, Check Point Software Technologies, a new form of malware for encryption, defined "KingMiner& # 39; You see that & # 39; it is evolving & # 39;

This news is according to the research published by the company on Thursday. Two of the business researchers, Ido Solomon and Adi Ikan, said so KingMinerwhich is a type of malware coming from Monero blockchain about six months ago.

When researchers refer to it as evolving, they refer to the way it changes over time to avoid detection, this even leads to replacing earlier versions of itself that it meets on host machines, updating its counterparts to help them to avoid detection.

The researchers said:

"Malware continually adds new features and exclusion methods to avoid emulation." Mainly, it manipulates the necessary files and creates a dependency that is critical during emulation. "

It is because of these tactics that malware is able to minimize the chances that it is detected by security systems, being able to reduce "significant" detection rates.

The the malware it is mainly aimed at Microsoft-based servers (mainly IIS / SQL servers), with the program itself developed to intercept 75% of a victim's machine, leaving the rest intact. But sometimes, it manages to exploit 100 percent of the processing power of the victims.

One of the most hidden ways in which it is able to mask its visibility to suspicious users and software is to mask itself inside a private mining pool, this means that it would also turn off the API.

"We have not yet determined which domains are used, as this is also private, but we can see that the attack is currently widespread, from Mexico to India, from Norway and from Israel," the researchers continue. to explain to the research paper.

This continuous ability to change, evolve and update contemporary programs has continued to predict that these same evasive techniques will continue to evolve in 2019, making it increasingly common among crypto-mining malware variants.

[ad_2]Source link