Many VPN Providers Leak Customer’s IP Address via WebRTC Bug Microsoft Releases Tool for Running Any Linux OS on Windows 10 Meltdown Patch Opened Bigger Security Hole on Windows 7 Academics Discover New CPU Side-Channel Attack Named BranchScope Get 97% off The Lifetime MCSA Windows Server 2016 Training Bundle Deal Facebook Reveals the “Access Your Information” Data Tool and New Privacy Shortcuts InsaneCrypt (desuCrypt) Decrypter Remove Ads by GamerSuperstar Advertisements Remove the This Build of Windows 7 is Corrupted Tech Support Scam Remove the Something went wrong with your Internet Service Scam Remove Security Tool and SecurityTool (Uninstall Guide) How to remove Antivirus 2009 (Uninstall Instructions) How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller Locky Ransomware Information, Help Guide, and FAQ CryptoLocker Ransomware Information Guide and FAQ CryptorBit and HowDecrypt Information Guide and FAQ CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ Restrict What Personal Data Is Shared on the Facebook API Platform How to Delete Your Facebook Account How to Deactivate a Facebook Account How to Backup Your Facebook Posts, Images, and Data How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Trend Micro security experts have warned users today about a new type of Android malware that infects devices and untetheredly mines Monero in the phone’s background until the battery is exhausted or the device gives out. Called HiddenMiner, this malware has been spotted inside apps distributed via third-party stores.
Researchers say that most of the infected users are based either in China or India. Experts say they’ve tracked the malware’s operations back to a mining pool where crooks made 26 XMR (around $5,400).
HiddenMiner is not the first untethered Monero-mining malware that affects Android devices. The first was Loapi, spotted last December.
HiddenMiner took inspiration from Loapi because just like the aforementioned, HiddenMiner works by tricking users into giving it access to an administrator account. The malware then uses this account to hide the original app behind transparent app icon, and immediately start a Monero miner that runs at all times in the phone’s background.
“There is no switch, controller or optimizer in HiddenMiner’s code, which means it will continuously mine Monero until the device’s resources are exhausted. Given HiddenMiner’s nature, it could cause the affected device to overheat and potentially fail,” said Lorin Wu, a Mobile Threat Analyst for Trend Micro. Read more from bleepingcomputer.com…
thumbnail courtesy of bleepingcomputer.com