Advertisement
AD

Main navigation

New Mining Malware for XMR Evolves: Research

Advertisement
Fri, 30/11/2018 - 19:06
New Mining Malware for XMR Evolves: Research
Cover image via U.Today
Read U.TODAY on
Google News
Contents
Advertisement

In a research document issued on Thursday, two scientists from the Check Point Software Technologies cybersecurity firm mentioned that the KingMiner virus designed for mining Monero first appeared half-a-year ago, but now it is changing to hide from being detected. The malware even replaces its older versions when it faces them on host computers.

What the researchers say

As per the experts of the company, the mining virus keeps adding extra features and tools for evading emulation. The malware mostly manipulates files and brings to existence dependency, which is critical when it comes to emulation. This makes anti-virus software detect KingMiner at rates that are quite reduced compared to the real ones.

Related
Hackers Compromise BitPay’s Wallet, Adding Malware to the Code

How KingMiner works

The virus in question attacks servers of Microsoft (mainly IIS/SQL). The malware configuration allows it to use 75 percent of the attacked PC for XMR mining, but in reality it uses the whole 100 percent of the CPU on the attacked machine.

KingMiner also utilized private mining pools to keep its own operation secret and to avoid being found. As per the scientists, the malware is presently spread from Israel to India, Scandinavia, and Mexico.

The experts at Check Point Software Technologies reckon that the malware still succeeds thanks to these constant changes in its structure and code. They believe this virus will keep developing itself next year as well and will become more popular, with other mining malware copying some of its elements.

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD