{"id":34828,"date":"2022-08-31T23:59:34","date_gmt":"2022-09-01T03:59:34","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=34828"},"modified":"2022-08-31T23:59:38","modified_gmt":"2022-09-01T03:59:38","slug":"crypto-mining-malware-infects-miners-on-112000-pcs","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/crypto-mining-malware-infects-miners-on-112000-pcs\/","title":{"rendered":"Crypto mining malware infects miners on 112,000 PCs"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">This cunning malware, which masquerades as legal desktop software, has infected thousands of computers across 11 countries, forcing people to unintentionally mine Monero (XMR).<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263.png\" alt=\"Crypto mining malware infects miners on 112,000 PCs\" class=\"wp-image-34839\" width=\"769\" height=\"433\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263.png 810w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263-300x169.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263-768x432.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263-150x84.png 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263-750x422.png 750w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><figcaption>Crypto mining malware infects miners on 112,000 PCs<\/figcaption><\/figure>\n\n\n\n<p>According to a recent study, <a href=\"https:\/\/coinscreed.com\/staging\/russian-central-bank-executive-lists-one-condition-for-crypto-mining.html\" target=\"_blank\" rel=\"noreferrer noopener\">crypto mining<\/a> malware has been covertly infecting millions of machines worldwide since 2019 by disguising itself as trusted applications like Google Translate.<\/p>\n\n\n\n<p>The virus has been evading detection for years, according to a paper released on August 29 by Check Point Research (CPR), a research group for the American-Israeli cybersecurity business Check Point Software Technologies.<\/p>\n\n\n\n<p>In part because of its cunning architecture, which postpones the crypto mining <a href=\"https:\/\/www.google.com\/search?q=Crypto+mining+malware+infects+miners+on+112,000+PCs&rlz=1C1CHBF_enNG1007NG1008&sxsrf=ALiCzsZRBJ82G8357-5UfBmUQA6bOLOhfg:1662003906358&source=lnms&tbm=isch&sa=X&ved=2ahUKEwi-m9CD1_L5AhXwhv0HHeGLCHEQ_AUoAnoECAEQBA&biw=1366&bih=568&dpr=1#imgrc=FGUFIyBiliqmDM\" target=\"_blank\" rel=\"noreferrer noopener\">virus installation<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> for weeks after the first program download.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/_CPResearch_?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@_CPResearch_<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> detected a <a href=\"https:\/\/twitter.com\/hashtag\/crypto?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#crypto<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> miner <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#malware<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> campaign, which potentially infected thousands of machines worldwide. Dubbed \u2018Nitrokod,\u201d the attack was initially found by Check Point XDR. Get the details, here: <a href=\"https:\/\/t.co\/MeaLP3nh97\" target=\"_blank\">https:\/\/t.co\/MeaLP3nh97<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cryptocurrecy?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#cryptocurrecy<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TechnologyNews?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#TechnologyNews<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/twitter.com\/hashtag\/CyberSec?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#CyberSec<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/t.co\/ANoeI7FZ1O\" target=\"_blank\">pic.twitter.com\/ANoeI7FZ1O<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Check Point Software (@CheckPointSW) <a href=\"https:\/\/twitter.com\/CheckPointSW\/status\/1564249955467870209?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 29, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The malware application infects PCs using fake desktop versions of well-known programs like YouTube Music, Google Translate, and Microsoft Translate. It is linked to a Turkish-speaking software developer that advertises &#8220;free and secure software.&#8221;<\/p>\n\n\n\n<p>A covert Monero (<a href=\"https:\/\/coinscreed.com\/staging\/monero-xmr-will-introduce-tail-emission-in-30-days-to-protect-miners-interests.html\" target=\"_blank\" rel=\"noreferrer noopener\">XMR<\/a>) crypto mining business is set up after a virus installation procedure is progressively initiated via a scheduled task mechanism over the course of many days.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/coinscreed.com\/staging\/cybersecurity-firm-kaspersky-ranks-cryptojackers-among-top-malware-threats-in-africa.html\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> company said that the &#8220;Nitrokod&#8221; crypto miner, which has its headquarters in Turkey, had infected computers in 11 different nations.<\/p>\n\n\n\n<p>For CPR, counterfeit versions were offered on well-known software distribution websites like Softpedia and Uptodown under the publication name &#8220;Nitrokod INC.&#8221;<\/p>\n\n\n\n<p>Even though Google doesn't have an official desktop version of that software, the phony desktop version of Google Translate on Softpedia had almost a thousand ratings and an average star rating of 9.3 out of 10. Some of the apps had been downloaded hundreds of thousands of times.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264.png\" alt=\"\" class=\"wp-image-34843\" width=\"691\" height=\"478\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264.png 905w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264-300x208.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264-768x531.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264-150x104.png 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-264-750x519.png 750w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/figure>\n\n\n\n<p>Check Point Software Technologies claims that a crucial element of the fraud is providing a desktop version of the programs.<\/p>\n\n\n\n<p>Since most Nitrokod apps don't have desktop versions, people who believe they've uncovered a program that's not accessible elsewhere may be drawn to the fake software.<\/p>\n\n\n\n<p>The malware-filled fakes may also be found &#8220;by a simple online search,&#8221; claims Maya Horowitz, VP of Research at Check Point Software.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;What's most interesting to me is the fact that the malicious software is so popular, yet went under the radar for so long.&#8221;<\/p><\/blockquote>\n\n\n\n<p>The Google Translate Desktop ripoff from Nitrokod is still one of the top search results as of this writing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-malware-design-helps-avoid-detection\">Malware Design helps avoid detection<\/h2>\n\n\n\n<p>Because the phony applications may imitate the same features that the real apps provide, it might be difficult to identify the virus even after the user opens the bogus program.<\/p>\n\n\n\n<p>Using a Chromium-based framework, the majority of the hacker's applications are quickly generated from the official websites, enabling them to distribute usable apps laced with malware without having to create them from scratch.<\/p>\n\n\n\n<p>Israel, Germany, the United Kingdom, America, Sri Lanka, Cyprus, Australia, Greece, Turkey, Mongolia, and Poland are just a few of the countries that have had over 100,000 victims of the virus so far.<\/p>\n\n\n\n<p>Horowitz claims a few simple security practices may help lower the danger of being duped by this virus and others like it.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;Beware of lookalike domains, spelling errors in websites, and unfamiliar email senders. Only download software only from authorised, known publishers or vendors and ensure your endpoint security is up to date and provides comprehensive protection.&#8221;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>This cunning malware, which masquerades as legal desktop software, has infected thousands of computers across 11 countries, forcing people to unintentionally mine Monero (XMR). According to a recent study, crypto mining malware has been covertly infecting millions of machines worldwide since 2019 by disguising itself as trusted applications like Google Translate. The virus has been [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":34839,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21,130,26],"tags":[7789,202,4231,366,18],"class_list":["post-34828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-blockchain-news","category-cryptocurrencies","tag-cybercrime","tag-blockchain","tag-malware","tag-scam","tag-software"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/image-263.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/34828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=34828"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/34828\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/34839"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=34828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=34828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=34828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}