2018-11-11 22:00 |
Cryptojackers make up most of 2018, as numerous hacks and scams have since been revealed. With this being said, a group of researchers at Trend Micro found that said jackers are finding smart ways to prevent themselves from being caught at all costs.
As reported by CCN, the researchers supposedly came across a crypto mining malware that utilized complex techniques to ensure they are never traced back to and one of them has been identified as “Coinminer.Win32.MALXMR.TIAOODAM.”
Coinminer.Win32.MALXMR.TIAOODAM is a crypto software that appears as an installer file on the Windows OS, which makes it less likely to be acknowledged as a threat. Due to its ability to blend right it, the malware allegedly spreads itself bypassing the existing security filters.
When the researchers conducted tests, they found that the said software installs itself under a FileZilla folder, which has been described as a free software that enables users to transfer files over the internet. Given that this file does not already exist on one’s system, the malware has the ability to create it as a safe spot.
As per the claims made, researchers are under the assumption that it could have been created in Eastern Europe due to the use of Cyrillic.
To conclude, Trend Micro’s researchers noted that other measures have also been taken by said jackers to protect themselves. That is, through the use of WiX, which is also a Windows-based installer. Although, Cryptojackers are getting smarter and smarter, the fact that their methods are being unveiled goes to show the endless possibilities in which a computer can get infected.
What are your thoughts on these findings? Are you shocked to see the different ways malware attacks take place? Let us know in the comments below.
Cryptojacking is up 459% in 2018, and it’s the NSA’s Fault https://t.co/tlOrnbECFg
— CCN (@CryptoCoinsNews) September 20, 2018
origin »