Monero or XMR a few days ago announced the launch of their new online platform to enlighten users on cleaning crypto-ransomware and malware.
Two of Monero's most amazing are his privacy and ease of extraction. But these characteristics are what makes this currency susceptible to bad actors who use this digital currency in malware. In an interview with a CNN, Justin Ehrenhofer, director of Malware Response Workgroup, commented that two critical aspects make this currency surprising for scammers and hackers.
Two reasons why hackers love these coins is that: first of all, in a private way, hackers do not have to worry about the ordering forces and monitor what they do with the coin after extracting it, and secondly, This coin uses PoW or Proof of Work which is a GPU and CPU friendly algorithm. As a result, the infected machines are competitive. These components are factors for which hackers decide to extract Monero and not BTC, ETH or Altcoin.
The reason this platform is built according to Ehrenhofer is to help victims of ransomware attacks and illegal mining activities, which most of the time have no idea what extraction, digital currencies and Monero. The growing incidence of malware has led to the creation of this platform. The new platform tries to update and inform visitors on the best ways to avoid and eliminate malware. In addition to knowing if malware is working on your comp, the platform includes solutions for various types of attacks commonly used by hackers.
Scripts for extracting XMR in the web browser are usually used as an opt-in service for visitors to finance websites. Slate.com has temporarily added digital currency extraction as an option for guests rather than for ads.
But hackers can also inject scripts into weak and defenseless sites with the needs of webmasters. This action is called crypto jacking. Research shows that this activity increases by 86% in May of this year. But a few months ago, the number of crypto-jacking has increased to a significant percentage, due to the leak of NSA hacking tools that hackers use to infect ransomware computers.
XMR itself is not harassing computers. However, networks are annoyed by susceptibility and the hacker chooses to run the mining program on compromised tools. Because cryptojacking is new to both Internet users and webmasters, and most of the time, education is the best way to get to know and respond quickly to computer violations. Ehrenhofer made it clear that the XMR community and technology do not neglect any offensive action in which currency is used