Advertisement
AD

Main navigation

Error message

  • Warning: Undefined array key 1 in Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard() (line 3111 of modules/custom/cryptocompare/src/TwigExtension/RemoveSpace.php).
    Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard('
                        Contents
                        <ul class="article__contents-list"><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h251">Why the victims got misled</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h328">Anti-virus be blessed</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h485">A rise in the mining market</a></li></ul>
        Advertisement
        
            
        
        
            
                    
                
                                                
    
            
            
                    
                
                                                
    
            
        
    Five young men were taken into custody by cyber police of <a href="https://u.today/new-development-in-south-koreas-cryptocurrency-stance">South Korea</a> on Thursday, Nov. 8. The official report says that the young hackers were acting under the direction of Kim Amu-gae, 24 years old. The cyber gangsters sent out nearly 33,000 emails with embedded malware for crypto mining to infect PC users in the country.
    
    Claiming to be employers, the hackers all in all sent out a great number of emails to job applicants during the period from mid-autumn to early winter 2017.
    
    Why the victims got misled
    
    The victims turned to be job candidates of local IT corporations. The <a href="https://u.today/11-bln-in-cryptocurrency-stolen-this-year-so-far-cybersecurity-report">cybersecurity</a> agency states that the hackers got hold of their email addresses on different headhunting forums. All those applicants had sent their CVs to recruitment agencies to be reviewed by employers.
    
    <a rel="nofollow" target="_blank" href="#">card</a>
    
    The <a href="https://u.today/hackers-forge-billion-eos-coins-to-steal-real-crypto-from-dex">hackers</a> sent them emails with attached documentation that contained mining malware. The victims downloaded the attached files on their computers. Thus, they right away installed the malware letting it work in the background.
    
    Anti-virus be blessed
    
    Around 6,000 of the infected computers had advanced anti-virus software installed, so the programs for <a href="https://u.today/cryptojacking-is-more-rampant-than-ever-in-2018-report">cryptojacking</a> were safely removed automatically within a week.
    
    Firms specializing on cybersecurity also started investigating the mining fraud. Thanks to that, IT experts were able to conduct tests and clean the rest of the infected computers from the malware.
    
    Local cyber police pointed out that the threat was neutralized due to the quick reaction of anti-virus companies. Thanks to their actions, the hackers failed to obtain any great amount of profit from their operations — $1,000 all in all. Once the <a href="https://u.today/bitcoin-mining-malware-distributed-through-telegram-app-kaspersky-lab">malware</a> was detected and deleted, the hackers would send more harmful software, but it was removed again.
    
    <a href="https://u.today/cointicker-app-spreads-malware-to-watch-over-host-computer-report">card</a>
    
    A rise in the mining market
    
    Recently, the overall market of crypto mining has grown greatly despite the surge of the costs for mining major coins. Hackers often design malware they send out to unaware victims for minting <a rel="nofollow" target="_blank" href="#">Monero</a>. However, now XMR mining on average PCs has become more difficult since the Monero developers have changed the codes, raising barriers for ordinary miners to verify XMR transactions.
    ') (Line: 1133)
    Drupal\cryptocompare\TwigExtension\RemoveSpace->formatbody(Array) (Line: 54)
    __TwigTemplate_75845256f703f5319a38e035b4af7dd9->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/field--body.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('field', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array) (Line: 474)
    Drupal\Core\Template\TwigExtension->escapeFilter(Object, Array, 'html', NULL, 1) (Line: 1002)
    __TwigTemplate_625426e732c5f7a66fde6d628d98a6b2->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 62)
    __TwigTemplate_e934e56c1e459c359b150360c7169113->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/node.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('node', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
    Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
    Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
    Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
    Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
    Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
    call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
    Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
    Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
    Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
    Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
    Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
    Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
    Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
    Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
    
  • Warning: Undefined array key 1 in Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard() (line 3114 of modules/custom/cryptocompare/src/TwigExtension/RemoveSpace.php).
    Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard('
                        Contents
                        <ul class="article__contents-list"><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h251">Why the victims got misled</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h328">Anti-virus be blessed</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h485">A rise in the mining market</a></li></ul>
        Advertisement
        
            
        
        
            
                    
                
                                                
    
            
            
                    
                
                                                
    
            
        
    Five young men were taken into custody by cyber police of <a href="https://u.today/new-development-in-south-koreas-cryptocurrency-stance">South Korea</a> on Thursday, Nov. 8. The official report says that the young hackers were acting under the direction of Kim Amu-gae, 24 years old. The cyber gangsters sent out nearly 33,000 emails with embedded malware for crypto mining to infect PC users in the country.
    
    Claiming to be employers, the hackers all in all sent out a great number of emails to job applicants during the period from mid-autumn to early winter 2017.
    
    Why the victims got misled
    
    The victims turned to be job candidates of local IT corporations. The <a href="https://u.today/11-bln-in-cryptocurrency-stolen-this-year-so-far-cybersecurity-report">cybersecurity</a> agency states that the hackers got hold of their email addresses on different headhunting forums. All those applicants had sent their CVs to recruitment agencies to be reviewed by employers.
    
    <a rel="nofollow" target="_blank" href="#">card</a>
    
    The <a href="https://u.today/hackers-forge-billion-eos-coins-to-steal-real-crypto-from-dex">hackers</a> sent them emails with attached documentation that contained mining malware. The victims downloaded the attached files on their computers. Thus, they right away installed the malware letting it work in the background.
    
    Anti-virus be blessed
    
    Around 6,000 of the infected computers had advanced anti-virus software installed, so the programs for <a href="https://u.today/cryptojacking-is-more-rampant-than-ever-in-2018-report">cryptojacking</a> were safely removed automatically within a week.
    
    Firms specializing on cybersecurity also started investigating the mining fraud. Thanks to that, IT experts were able to conduct tests and clean the rest of the infected computers from the malware.
    
    Local cyber police pointed out that the threat was neutralized due to the quick reaction of anti-virus companies. Thanks to their actions, the hackers failed to obtain any great amount of profit from their operations — $1,000 all in all. Once the <a href="https://u.today/bitcoin-mining-malware-distributed-through-telegram-app-kaspersky-lab">malware</a> was detected and deleted, the hackers would send more harmful software, but it was removed again.
    
    <a href="https://u.today/cointicker-app-spreads-malware-to-watch-over-host-computer-report">card</a>
    
    A rise in the mining market
    
    Recently, the overall market of crypto mining has grown greatly despite the surge of the costs for mining major coins. Hackers often design malware they send out to unaware victims for minting <a rel="nofollow" target="_blank" href="#">Monero</a>. However, now XMR mining on average PCs has become more difficult since the Monero developers have changed the codes, raising barriers for ordinary miners to verify XMR transactions.
    ') (Line: 1133)
    Drupal\cryptocompare\TwigExtension\RemoveSpace->formatbody(Array) (Line: 54)
    __TwigTemplate_75845256f703f5319a38e035b4af7dd9->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/field--body.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('field', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array) (Line: 474)
    Drupal\Core\Template\TwigExtension->escapeFilter(Object, Array, 'html', NULL, 1) (Line: 1002)
    __TwigTemplate_625426e732c5f7a66fde6d628d98a6b2->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 62)
    __TwigTemplate_e934e56c1e459c359b150360c7169113->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/node.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('node', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
    Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
    Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
    Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
    Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
    Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
    call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
    Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
    Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
    Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
    Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
    Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
    Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
    Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
    Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
    

Five Hackers Arrested After Infecting 6,000 PCs with Mining Malware

Advertisement
Thu, 8/11/2018 - 18:08
Five Hackers Arrested After Infecting 6,000 PCs with Mining Malware
Cover image via U.Today
Read U.TODAY on
Google News
Contents
Advertisement

Five young men were taken into custody by cyber police of South Korea on Thursday, Nov. 8. The official report says that the young hackers were acting under the direction of Kim Amu-gae, 24 years old. The cyber gangsters sent out nearly 33,000 emails with embedded malware for crypto mining to infect PC users in the country.

Claiming to be employers, the hackers all in all sent out a great number of emails to job applicants during the period from mid-autumn to early winter 2017.

Why the victims got misled

The victims turned to be job candidates of local IT corporations. The cybersecurity agency states that the hackers got hold of their email addresses on different headhunting forums. All those applicants had sent their CVs to recruitment agencies to be reviewed by employers.

card

The hackers sent them emails with attached documentation that contained mining malware. The victims downloaded the attached files on their computers. Thus, they right away installed the malware letting it work in the background.

Anti-virus be blessed

Around 6,000 of the infected computers had advanced anti-virus software installed, so the programs for cryptojacking were safely removed automatically within a week.

Firms specializing on cybersecurity also started investigating the mining fraud. Thanks to that, IT experts were able to conduct tests and clean the rest of the infected computers from the malware.

Local cyber police pointed out that the threat was neutralized due to the quick reaction of anti-virus companies. Thanks to their actions, the hackers failed to obtain any great amount of profit from their operations — $1,000 all in all. Once the malware was detected and deleted, the hackers would send more harmful software, but it was removed again.

A rise in the mining market

Recently, the overall market of crypto mining has grown greatly despite the surge of the costs for mining major coins. Hackers often design malware they send out to unaware victims for minting Monero. However, now XMR mining on average PCs has become more difficult since the Monero developers have changed the codes, raising barriers for ordinary miners to verify XMR transactions.

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD