TrustWave finds Coinhive Monero Mining Malware that hijacks 200,000 MicroTik routers in Brazil

[ad_1]
  TrustWave-Finds-Coinhive-Monero-Mining-Malware-Hijacking-200000-MicroTik-Router-in-Brazil
  cryptocurrency-event-2018

200,000 investors become victims of a massive malware attack in Brazil [19659004] Malicious software was found on a group of Monero mining systems on August 3 Systems, located in Brazil, and their menacing software were found by Simon Kenin which is TrustWave Researcher . He noted that MicroTik was in use for the attack, which had an impact on 200,000 routers operating in the Monero mining service.

These cyber thugs have developed a program that runs in the background, while they infiltrate the whole system with a malware code. The CPUs and a certain mining script called coinhive. The script runs glob ally, which makes hacking even easier.

According to Forbes, the router contains a microchip, which bears a great resemblance to those used by handheld devices. Even if the microchip is not exactly well protected or powerful, it is able to do much more than connect to the Internet. In general, user accounts are still relatively safe with mining malware, since hackers do not try to steal a user's resources. Instead, it does not damage the infiltrated devices much and can cause low performance speeds.

The company has already installed a patch for its threat in April, which was set by the router creator. Unfortunately, many of the owners of these routers did not install the update or were not informed.

Kenin said, after the analysis, "I would like to emphasize how serious this attack is, there are hundreds of thousands of these devices worldwide, used by ISPs and by different organizations and companies , each device serves at least tens, if not hundreds, of users per day. "

Continue to discuss the tendency of mining, which now includes scripts such as coinhive with Monero.

To add to this feeling, Kenin said, "Miners, on the other hand, can be much more stealthy, so while a single computer could produce more money from ransomware if the user ends up paying, an attacker would prefer to run a stolen miner for a longer period of time.The plan is that at some point the mining would be just as profitable as, if not more, the payment of a one-time ransom. "

  crypt training course

[ad_2]Source link