
An active cryptocurrency mining malware campaign has already infected more than 111,000 users in Germany, Israel, Poland, the U.S. and other countries, according to a report published by American-Israeli cybersecurity provider Check Point Software Technologies.
Bad actors are setting traps for victims on websites of the likes of Softpedia that feature free software. They trick them into downloading the desktop version of such services as YouTube Music and Microsoft Translator. The catch? These services do not actually have official desktop versions.
Advertisement
Ripple Makes Big 5-Year Tokenization Prediction, Shiba Inu (SHIB) Breakout You Won't Want to Miss, XRP Price Surprise Trigger Revealed: Crypto News Digest
Next 15 Years: Major Crypto Money Forecast Shared by Ex-Coinbase’s Nick Tomaino
Bitcoins Being Stolen from Old Wallets with Quantum Tech, Former Wall Street Trader Claims
Shiba Inu (SHIB) Biggest 2025 Breakout Is Around, Bitcoin (BTC) Recovery Failed, Ethereum (ETH): Worst Since Hitting $4,000?
It managed to remain undetected for such a long period of time because of its sophisticated multi-stage infection process. By delaying the execution of malware for weeks after installation and removing all the traces, this makes it extremely hard to link the malware to a particular ill-fated installation.
After execution, the malware starts a stealth Monero (XMR) crypto-mining operation by connecting to its command-and-control server and getting the XMRig CPU mining tool. In order to make sure that the malware remains active, a scheduled task is set to run the scam every day.
Check Point claims that even unsophisticated users are capable of getting access to the necessary toolset that can be installed with just a few clicks.
Monero remains the undisputed ploy currency of cryptojackers because of its anonymity features. A 2019 study showed that illicit crypto mining was responsible for as much as 4% of XMR's total circulating supply.