A previously unidentified type of Bitcoin miner malware that’s been operational since 2013 just revealed itself to the global public. The program has infected computers in Brazil, Canada, the United States, and Peru, the latter of which was most severely affected. In total, the attack has generated more than 138 Bitcoins in profit for the culprits. For those who don’t know, that’s about $284,322 BRL, or $88,663.62 USD. How did the malware pull it off? With a botnet, a massive network of thousands, or even hundreds of thousands of infected computers.
Although the specific malware used in this attack is relatively new, Bitcoin theft is not. Since the cryptocurrency was created, malicious hackers have invented malware programs designed to rob Bitcoins from unsuspecting (and often unprotected) individuals. In 2014 alone, the U.S. tech security firm Dell Secureworks discovered approximately 80 different types of malware made specifically to procure Bitcoins.
How Bitcoin Stealing Malware Works
These programs work in several ways, and a fair amount of them can be operated by people with little to no experience in coding or programming. All they have to do is buy cheap, effective tools that can target vulnerable devices. In the hacker underground, someone can purchase PredatorPain, a highly infectious piece of malware that functions as a file, and credential-stealing Trojan program, for about $144 BRL (or $44 USD). Another program, SovietMiner, is designed to steal wallet files, and force infected devices to mine Bitcoins.
More specifically, it adds transaction records to Bitcoin’s public ledger of past transactions for the hacker’s profit. The latter costs about $48.89 BRL ($15 USD) per month. With general wallet-stealing malware, the virus searches for wallet files stored on the victim’s computer, and subsequently uploads applicable files to a remote server, where the hacker can extract the keys from said files, and obtain coins by signing a transaction to transfer the money to their account.
Safety First
Malware programs can infiltrate computers in several ways, but the most common method is to bug USB drives. The malware hides folders and files on the USB, replaces them with shortcuts, and effectively controls the infection of other devices that connect to the USB port.
While all this information may seem daunting, you should know that it’s within your means to protect yourself from these data breaches, and online attacks. By installing PSafe Total on your Android phone, you give yourself everything you need to defend your device from this sort of infectious malware. Don’t hesitate, and do what you can to protect yourself today.
Learn all about one of the hackers' favorite breach method and keep your company safe…
Have you ever wondered how to recover deleted photos on Android? After all, the lack…
Digital worms are among the most serious threats in the wild kingdom of the Internet.
Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…
Five Steps to Reduce QR Code Risk! Step one? Read this article…
Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…