Monero (XMR) causes KingMiner's malware for cryptography that constantly evolves to detection of evasion

[ad_1]
Monero-XMR-Cause-KingMiner-Cryptojacking-Malware-to-continuously-Evolve-to-Evade-Detection

Cryptojacking Malware KingMiner is constantly improved for detection to evade

Cryptojacking it's a big problem in the cryptography sector. With sophisticated malware, users can convince victims to give them money indirectly using their computers to extract encrypted files. Now, a highly dangerous malware known as KingMiner It's in the spotlight.

KingMiner is a cryptographic malware that extracts Monero. It is used to update constantly in order to avoid detection of even the most sophisticated antivirus software and until now has been quite successful.

According to Check Point Software Technologies, an Israeli security company, Kingmaker It is one of the most dangerous cryptographic tools used by hackers and its constant improvements will make it even more difficult for security companies to detect them.

The report states that KingMiner it is particularly aimed at servers developed by Microsoft using International Information Services (IIS) and SLQ Server technology. He uses his technology to decipher the passwords of the victims and then compromises them.

Just the the malware manages to get accessuses a Windows Scriptlet file with the extension .sct to run its program. The file is downloaded without the user knowing it. Next, he uses the CPU architecture of the company to extract Monero. It also disables any previous version of malware if it is detected.

After the computer is affected, it will use 75% of the CPU power my Monero (but errors in the code can make it use even more capacity). While the mechanisms used by KingMiner circumventing detection are actually quite simple, i the malware takes extreme measures to prevent its action from being found.

Therefore, it ends up being a very powerful tool for hackers who want to extract Monero using other people's computers. It even uses a private data mining pool to prevent mining monitoring. Nobody even knows which domains are used.

The attacks grow as the detection rates are low

Even if the attacks are hard to detect, some people are noticing them (like, well, they use 75% of the CPU power, so a more tech-savvy user can clearly see that something is wrong).

Cryptojacking it has become something common, unfortunately. Cases of being attacked by encrypted malware have increased by 86% this year according to McAfee Labs and this only explains the people who actually discovered that their computers were infected.

Now even the smartphones are being targeted, points out McAfee Labs, so the situation is going out of control quickly and the cybersecurity companies are not able to stop the hackers. Until a solution is found, it seems that most cases will get worse.

[ad_2]Source link