[Latest News][6]

Coin News
get free Cryptocurrency
Mining Hardware
Wallets and Exchanges

Monero mining malware targets free software

Monero mining malware targets free software

We�ve seen Monero XMR hungry hackers hiding XRM mining malware in Adobe Flash updates, and even in legitimate Windows updates, but now hackers are hiding it in cracked audio production free software.
Monero mining malware targets free software

Security researchers at ESET have uncovered a Monero cryptocurrency mining bot called LoudMiner. Monero mining Hackers have been distributing it since August 2018, but in the past month has begun to surface in pirated versions of VST (Visual Studio Technology)."Monero mining malware targets free software"

Indeed, hiding malware program in pirated free software is nothing new in this world. One always dances with the devil when downloading bootleg programs, but LoudMiner is unique in that it�s cross-platform, affecting both MacOS and Windows users.

LoudMiner in unique in that it runs on a Tiny Core Linux virtual machine, meaning it can run on both operating systems.

Researchers believe hackers used VST software because it�s highly likely that it will be installed on a computer with a high-end CPU. What�s more, given VST software uses lots of CPU resources, the miner stands a chance of going unnoticed.

Unfortunately for hackers, though, some individuals recognized that their systems began to display suspicious activity after downloading a �dodgy plugin.�

The researchers found at least four versions of LoudMiner, which is itself an XMRig Monero cryptocurrency miner. It�s unclear if hackers were able to earn any cryptocurrency through this attack.

It installs itself at the root level, in a virtual Linux environment, programmed to load every time the user reboots their system. One victim reported having to reinstall MacOS to get rid of the bug.

As you might expect from ESET software, ESET researchers recommend not installing pirated software as a first line of defense against this kind of attack. And obviously, we agree, we would never recommend you download torrents.

Researchers also recommend keeping an eye on CPU usage and watching out for new processes added to your OS� list of startup programs.

About Author Mohamed Abu 'l-Gharaniq

when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries.

Start typing and press Enter to search