Amid Massive CoinHive Cryptojacking on Microsoft Platform, Company Removes Eight Free Apps

2019-2-16 00:12

Most of the stories in the media about cryptojacking and hacking are due to a vulnerability in a crypto exchange or simply highly advanced hackers. However, in a new report by Symantec, Microsoft has been the victim of the presence of a surreptitious Monero mining code on multiple applications.

As such, Microsoft has since removed eight Windows 10 applications that were formerly found on the Microsoft Store.

Cryptojacking involves the installation of malware onto a device that takes the processing power of the computer or similar device towards crypto mining. This is all done without the victim knowing that any mining is taking place. In the report from Symantec, the XMR mining code was detected in eight applications, which were issued by three separate developers, in January.

Upon alerting Microsoft, the company acted quickly to remove the products, though they did not provide a date for when the delisting took place.

According to the report, the applications included “a computer and battery optimization tutorial, internet search, web browsers, and video viewing and download.” The applications were issued by developers “DigiDream, 1clean and Findoo.”

When Symantec investigated the issue further, the evidence appears to link all of the apps to the same developer, or at least a single group.

The samples found are all exclusive to running on Windows 10 and Windows 10 S Mode, though they were created from April to December last year. To be activated, the trigger the Google Tag Manager to grab the coin-mining JavaScript library. After activating the mining script, it is relatively easy to use the CPU cycle of the computer to mine XMR.

Representatives of Symantec spoke with the ZDNet tech news website about this situation, saying that there never has been evidence of cryptojacking detected in the Microsoft Store. The success of these hackers seems to come from the fact that they use a standalone window that runs separately from the browser.

The report indicated that they also have “no throttling which means [they can use] up 100% of user’s CPU time.

Though there are privacy policies included in all of the apps, they also refrained from including details about crypto mining. The strain of mining malware found is the Coinhive XMR mining code. There is been no details released about the download or installation statistics, but the 1,900 ratings could give some indication as to how far these downloads spread before they were discovered.

Along with delisting the programs, Google Tag Manager also no longer has the mining JavaScript on it.

Cryptojacking recently became more threatening than ransomware, as far as cybersecurity risks in the Middle East, Turkey, and Africa. These details were the result of research performed by Kaspersky Lab, a cybersecurity research firm.

Bitcoin (BTC), Ethereum (ETH), XRP (Ripple), and BCH Price Analysis Watch (Feb 15th)

Similar to Notcoin - TapSwap on Solana Airdrops In 2024

origin »

Advanced Internet Blocks (AIB) на Currencies.ru

$ 0.0083535 (+0.26%)
Объем 24H $6.611k
Изменеия 24h: 0.06 %, 7d: -2.06 %
Cегодня L: $0.0079829 - H: $0.0083789
Капитализация $0 Rank 4363
Цена в час новости $ 0.0110483 (-24.39%)

microsoft cryptojacking victim symantec new hackers advanced

microsoft cryptojacking → Результатов: 2


Microsoft Store удалил восемь приложений со скриптом для скрытого майнинга

Специализирующаяся на кибербезопасности компания Symantec обнаружила в Microsoft Store для Windows восемь приложений со встроенной усовершенствованной версией Coinhive, скрипта для скрытого майнинга криптовалюты Monero.

2019-2-15 19:07