Cybersecurity researchers have discovered a dangerous strain of crypto-mining malwareWhich has made its way on Windows devices across the world.
As in a. is detailed in report good (opens in new tab) From security firm Check Point, the malware is smuggled inside various legitimate-looking applications distributed through online marketplaces, including those disguised as an official Google Translate client.
Once downloaded, the installation of malicious components is delayed for up to a month, in an attempt to avoid apps Antivirus And endpoint protection Filter. Obviously, this technology did not allow the operation to be known for years.
Avoiding Malware Infection
Although cryptominers are generally not designed to steal data or encrypt files, e.g. ransomwareAn infection can cause a different kind of problem for the sufferer.
In addition to hindering device performance, because CPU resources are set aside for mining activity, a transition can also lead to a physical increase in energy consumption, which could prove particularly costly in the current climate.
In this instance, the malware is hidden within several legitimate-looking applications listed on Softpedia, a repository of free software under the author’s name Nitrocode Inc. TechRadar Pro Comments have been sought from both Softpedia and Nitrocode.
The report said that since the campaign was active, some rigged programs have been downloaded by more than 100,000 people. and courtesy of several evasion techniques, including isolating activity and setting up a firewall Exclusion, Cryptominer is able to conduct its business without any alarm.
To protect against such malware, web users are advised to download applications exclusively from reputable marketplaces such as Google Play or Windows Store. Equally, although some strains are capable of side-stepping protection services, installing a leading antivirus solution will increase the chances of catching an infection.