The new DEFI platform enters the market! Earn passively - token sale 0.25 $ I'm going in!

A New Cryptocurrency-Mining Malware

3 min reading
A New Cryptocurrency-Mining Malware

ESET, a pioneer when it comes to cybersecurity, has detected an atypical malware that can infect MacOS and Windows.

This malicious software appeared in August 2018. A message regarding it was disclosed in ESET's research report published on June 20, 2019. LoudMiner - a new malware that uses computing power and processor power to (...) extract cryptocurrencies. According to ESET, a new malware named LoudMiner uses VirtualBox, a virtualization software, on Windows and QEMU on MacOS in order to extract cryptocurrencies by using Tiny Core Linux, a virtual miner. Thanks to this, it can infect many operating systems. Most probably the excavator itself uses XMRig, an open source software used to extract Monero altcoin (XMR). Thus, it prevents tracking of the transaction. Research has shown that in both MacOS and Windows, malware works together with pirated applications. They are combined with virtualization software and additional files. After downloading, LoudMiner is installed before the desired software, but it "hides" and installs permanently only after restarting the computer. ESET noted that this malware mainly aims applications related to audio production. They usually work on computers with high computing power so that the high CPU usage caused by extraction may not be suspicions in any way. Moreover, the attackers allegedly take advantage of the fact that such applications are usually very complex and large enough to easily hide images of virtual excavators. Moreover, according to researchers, the decision to use virtual excavators instead of an easier solution is quite unusual and extraordinary, it is not something that we see every day.

How to detect this malware?

Researchers are warning users that the best way to protect themselves from such malicious programs is to not download pirated versions of programs and applications. Nevertheless, along with high CPU usage, there are several factors that can help to unveil this malware. There are, among others, pop-ups from unexpected "additional" installer and a new application added to the list of startup servicesNetwork connections with unusual domain names, due to the scripts in the virtual excavator, are another sign of malware.
Currency Exchange rate Buy cryptocurrency

Buy crypto now

Dear customer,

We use cookies to provide our services correctly and safely. Cookies are small text-based data sets that shall be saved on the device you are using in connection with the use of this instnat website. Cookies are created in order to ensure proper functioning of thes instant website. By clicking the button "I accept and go to the website", you implicitly agree to creation of the cookies on your computer and to deploy automatic tracking and data collection and processing on behalf of the Lushup Holdings FZ LEE. Click the above-captioned button is also tantamount to accepting website's privacy policy. Closing the notification by means of "X" is unequivocally connected with your consent. If you do not agree to any of the above, please discontinue using our Website.

“Cookies” shall make an identification of the software used by you and to customization of this instant website to your needs. Cookies contain the name of the domain from which they origin, duration of period of their storage on your computer and an assigned value.

Third party cookies:
We also use third-party cookies for the following purposes:

  • creating statistics - helping to understand the way Users use the Website, which allows to improve its structure and content with use of the analytical tools
  • defining a user profile - in order to display custom-tailored content in advertising networks.

External entities that might be source of any third-party cookies on this instant Website are as follows:

Using a settings of your web browser or by using pre-set configuration tools available in our service you can independently and at any time change the settings concerning your use of the “cookies”, specifying the conditionsof their storage and how your device is creating and downloading them. These settings can be changed to block the automatic handling of cookies in the settings of your web browser or inform about their placement on your device each time.

Detailed information about the options related to use of “cookies” is available in the settings of your software (web browser).

Service privacy policy

This instant document lays out the principles of the Privacy Policy on the website (hereinafter referred to as the "Website" or "Service"). The administrator of the Website is Lushup Holdings FZ LEE, Fujairah - Creative Tower, P.O.Box 4422 Fujairah, United Arabs Emirates.

The full document to read the Tokeneo privacy policy is available in this document.

Advanced settings can be changed in your browser.