<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cryptojacking Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/cryptojacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 02 Aug 2018 14:59:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Cryptojacking Campaign Infected 170,000 MikroTik Routers</title>
		<link>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/</link>
					<comments>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 14:59:06 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coinhive]]></category>
		<category><![CDATA[coinhive script]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[mikrotik]]></category>
		<category><![CDATA[mikrotik routers]]></category>
		<category><![CDATA[mikrotik vulnerability]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=5104</guid>

					<description><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income. Unfortunately, in most cases, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income.</p>
<p>Unfortunately, in most cases, the hackers use others’ hardware for making money for themselves. Recently, security researchers discovered a massive cryptojacking campaign that targets and infects MikroTik routers with a copy of the Coinhive in-browser mining script. As you can tell, Coinhive mining script is one of the most popular in-browser mining scripts of all times.</p>
<p>The campaign appears to have started this week and at the first stage, was mainly active in Brazil. However, as its next target, it started infecting MikroTik routers all over the world.</p>
<p>A Brazilian researcher (<a href="https://twitter.com/malwarehunterbr?lang=en">@MalwareHunterBR</a>) identified the attacks first. The attack continued growing infecting more and more routers and got the attention of Simon Kenin – a security researcher from Trustwave’s SpiderLabs division.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">another mass exploitation against <a href="https://twitter.com/mikrotik_com?ref_src=twsrc%5Etfw">@mikrotik_com</a> devices (<a href="https://t.co/4MxQbnNStA">https://t.co/4MxQbnNStA</a>)<br />
hxxp://170.79.26.28/<br />
CoinHive.Anonymous(&#8216;hsFAjjijTyibpVjCmfJzlfWH3hFqWVT3&#8217;, <a href="https://twitter.com/hashtag/coinhive?src=hash&amp;ref_src=twsrc%5Etfw">#coinhive</a> <a href="https://t.co/Nr8MA0TbzY">pic.twitter.com/Nr8MA0TbzY</a></p>
<p>— MalwareHunterBR (@MalwareHunterBR) <a href="https://twitter.com/MalwareHunterBR/status/1023893755974352896?ref_src=twsrc%5Etfw">July 30, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h1>Numbers of infected routers</h1>
<p><img loading="lazy" class="wp-image-5107 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/200000.gif" alt="" width="621" height="242" /></p>
<p>In a <a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/Mass-MikroTik-Router-Infection-%E2%80%93-First-we-cryptojack-Brazil,-then-we-take-the-World-/">report from Trustwave</a>, Kenin mentioned that the hacker(s) behind the campaign successfully compromised at least 72,000 MikroTik routers at the first stage of attack in Brazil.</p>
<p>But at the second stage, it attacked and infected more and the total number rose up to 170,000.</p>
<p><em><strong>Update</strong></em>: Using a different Coinhive key, a new campaign of similar type was ongoing. It&#8217;s not sure whether the attacker is the same or another one. In total, the number is about 200,000 of infected routers.</p>
<h1>Infection method</h1>
<p><img loading="lazy" class="size-full wp-image-5106 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png" alt="" width="768" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png 768w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-696x696.png 696w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-420x420.png 420w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Kenin also said that the hacker(s) take the advantage of a zero-day vulnerability in the Winbox component of MikroTik routers. This vulnerability was first discovered back in April this year and MikroTik fixed the problem within 24 hours. However, this doesn’t mean that all the owners of the routers took the necessary steps to apply the required patch.</p>
<p>The zero-day was dissected by a number of security researchers and in GitHub, there are public proof-of-concept codes available. Check out proof-of-concept <a href="https://github.com/mrmtwoj/0day-mikrotik">1</a> and <a href="https://github.com/BasuCert/WinboxPoC">2</a>.</p>
<p>According to Kenin, the attacker(s) took the advantage of the public codes for altering traffic passing through the router and inject a copy of Coinhive library inside all the pages that passed through the router.</p>
<p>It’s only one threat actor, according to what information was found about the attacking. All the script shared the same Coinhive key.</p>
<h1>Other users infected</h1>
<p>Kenin says that he was able to identify where some non-MikroTik users were also impacted. It happened because some Brazilian ISPs were using MikroTik as their main network and thus, the attacker(s) successfully injected malicious Coinhive mining script in a massive amount of web traffic.</p>
<p>The attacker is also smart enough to decrease the surface of the attack. If users would get a lot of trouble visiting sites, both the ISPs and users would perform investigation on what’s going on. Recently, the attacker(s) switched tactics and only injecting the scripts in error pages returned by routers.</p>
<p>This doesn’t have a downfall for the attacker as it seems. Kenin said that in recent days, he noticed the attack spreading all over the world and infected nearly as much as 170,000 MikroTik routers.</p>
<p>Thus, even if the attacking surface is only limited to error pages, there are potentially millions of daily pages for the attacker.</p>
<h1>How to stay safe</h1>
<p>If you own a MikroTik router, it’s a must that you have to <a href="https://wiki.mikrotik.com/wiki/Manual:Upgrading">upgrade your router’s firmware</a>. Don’t forget to apply all the available patches as well.</p>
<p>It’s also recommended to reset the router to system default beforehand so that it will remove any possible malicious code present in the system.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improved Methods for Avoiding In-browser Miner Detection</title>
		<link>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/</link>
					<comments>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 12:10:20 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[in-browser miner]]></category>
		<category><![CDATA[miner]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2321</guid>

					<description><![CDATA[<p>Hackers are never the stupid ones for sure. Whenever they create a malware, it amazes us quite well. When the world learns to counter it, they improve or rewrite another malware to breach the system. That’s what happening to cryptojacking. It’s a process that uses others’ hardware resource to mine cryptocurrency and earn money without [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/">Improved Methods for Avoiding In-browser Miner Detection</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hackers are never the stupid ones for sure. Whenever they create a malware, it amazes us quite well. When the world learns to counter it, they improve or rewrite another malware to breach the system. That’s what happening to cryptojacking. It’s a process that uses others’ hardware resource to mine cryptocurrency and earn money without paying the electricity bill. In-browser mining tools are already in action, but hackers have found better techniques to hide the mining process from the system watchdogs.</p>
<p>Cryptojacking has turned into the hottest malware trend of the recent days. Hackers don’t need to break into your bank account. Instead, they can simply use your PC to make money. You pay for the energy consumption and hackers get their money free of charge. After emerging, lots of security software (antivirus, ad blockers, browser extensions etc.) are now able to detect and block cryptojacking scripts. The miner was previously loaded as JavaScript codes associated with cryptojacking servers.</p>
<p>Hackers now have found ways to work around the blocking and mine freely. Using proxy servers, crooks are now able to inject the mining code into your browser.</p>
<h3>Proxy servers helping to evade detection</h3>
<p>The most widespread and popular method of such workaround is deploying a “cryptojacking proxy server”. There’s an example available on GitHub, named <a href="https://github.com/x25/coinhive-stratum-mining-proxy">CoinHive Stratum Mining Proxy</a>.</p>
<p>These proxies allow the hackers to host the mining codes on their server (instead of CoinHive, DeepMiner, CryptoLoot servers) and load them as an anonymous JavaScript code. As you guessed, these servers are blocked by security programs by default.</p>
<p>Secondly, the proxies let the hackers to utilize a custom mining pool, featuring to detach the mining process from the parent cryptojacking service. For example, this ability ensures no fee payment to CoinHive.</p>
<p>Due to all these facilities, hackers are currently tending to use them as a defensive layer for their miners. Two security vendor company – Malwarebytes and Sucuri – have been tracking such attacks in the recent months.</p>
<p>The only way to identify the illegal mining is to check your system’s performance. If the CPU or GPU usage is pretty high, that means that a cryptojacking process is running. You can use Task Manager (on Windows) or System Monitor (on Linux) or any similar programs to check out the CPU usage regularly for any suspicious activity.</p>
<p>Hackers currently succeeded in earning $75,000 from a new campaign discovered recently. Learn more about <a href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">how hackers earned the money using a 5-years-old exploit</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/">Improved Methods for Avoiding In-browser Miner Detection</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Monero Miner Earned $75,000 using 5-years-old Exploit</title>
		<link>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/</link>
					<comments>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 11:08:39 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[monero]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2312</guid>

					<description><![CDATA[<p>Cryptojacking is not something new in the recent years. Cryptocurrencies are immensely valuable to real cash, making them a good target for earning more money. Cryptocurrencies need to be mined. It’s a computational process of solving puzzles that require heavy hardware power. Recently, hackers were successful in running a Monero miner on several Linux servers [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">New Monero Miner Earned $75,000 using 5-years-old Exploit</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptojacking is not something new in the recent years. Cryptocurrencies are immensely valuable to real cash, making them a good target for earning more money. Cryptocurrencies need to be mined. It’s a computational process of solving puzzles that require heavy hardware power. Recently, hackers were successful in running a Monero miner on several Linux servers using an old vulnerability.</p>
<p>This new campaign used the vulnerability in the Cacti plugin. For those who don’t know, Cacti is a PHP-based open-source tool for monitoring network, more specifically, in its “Network Weathermap” plugin. Using this plugin, servers visualize the network activity via a GUI.</p>
<p>Security experts from Trend Micro also found evidence that this attack is linked to the biggest cryptojacking in the history where hackers were able to earn around $3 million using a specialized Monero miner on Jenkins servers and by exploiting the CVE-2017-1000353 vulnerability. This time, the newer one used the CVE-2013-2618 vulnerability in the Cacti.</p>
<p>The flaw in Cacti allowed hackers to gain permission from the system to execute codes. Using the ability, they installed a modified version of XMRig – a legitimate software that’s used for mining Monero. In addition, they also included a bash script that worked as a watchdog for the mining process. If the miner program was down, it would restart it and if it was running, nothing to do. The checking process continued every 3 minutes.</p>
<p>This campaign earned the hackers 320 XMR ($75,000). All the infected servers were running Linux and major victims were situated in China, Taiwan, Japan and the USA.</p>
<h3>What to do now</h3>
<p>As long as the campaign is identified, it can be resolved very quickly. However, the hackers are already successful at their intentions. They earned a lot of cash, although less the largest one.</p>
<p>Such attacks demonstrate that our security measures are still not so tight after all. When it comes to updating the host system, system admins often forget or ignore them, as they may contain some complexity. That’s why hackers are able to keep on doing such hacking.</p>
<p>In order to stay protected, update all the software and the OS to the latest edition. It’s really important for fixing up all the known security holes. For every personal user, update all your programs to the latest version.</p>
<p>There are also other advanced cryptojacking campaigns, such as <a href="https://www.osradar.com/ghostminer-only-200/">GhostMiner – an awesome malware with fortune on our side</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">New Monero Miner Earned $75,000 using 5-years-old Exploit</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tesla Cloud Account Data Breached!</title>
		<link>https://www.osradar.com/tesla-cloud-account-data-breached/</link>
					<comments>https://www.osradar.com/tesla-cloud-account-data-breached/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Thu, 22 Feb 2018 11:10:22 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[tesla]]></category>
		<category><![CDATA[tesla breach]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1962</guid>

					<description><![CDATA[<p>According to the security company RedLock, hackers hacked a Tesla account on AWS (Amazon Web Service) using an unsecured Kubernetes container management console. The account contained sensitive information including telemetry data from the company’s electric cars. Hackers used the hardware resource to mine cryptocurrency &#8211; simply, cryptojacking. What happened? The hacker(s) broke into the account [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tesla-cloud-account-data-breached/">Tesla Cloud Account Data Breached!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>According to the security company RedLock, hackers hacked a Tesla account on AWS (Amazon Web Service) using an unsecured Kubernetes container management console. The account contained sensitive information including telemetry data from the company’s electric cars. Hackers used the hardware resource to mine cryptocurrency &#8211; simply, cryptojacking.</p>
<h3>What happened?</h3>
<p>The hacker(s) broke into the account and used it to “mine” cryptocurrency. Unfortunately, the account also included the proprietary data of the company. The hacker(s) succeeded in the attack because the automaker’s Kubernetes administration console didn&#8217;t have a password protection. A quick reminder – Google initially designed Kubernetes system It’s highly optimized for the cloud platform.</p>
<p>This incident kept access credentials for Tesla’s Amazon Web Services (AWS) accounts exposed to hackers. The hackers then used the data to deploy a cryptocurrency mining software named “Stratum” to mine cryptocurrency using the hardware resource of the cloud accounts. The hackers also took several measures to hide the process, like keeping the processor usage low, hiding the IP addresses of the mining pool servers behind CloudFlare etc.</p>
<p>Cryptocurrency mining a process where miners solve a series of math problems for validating a transaction using the computer’s processing power and add it to the network. However, RedLock didn’t specify which cryptocurrency hackers were mining on the accounts.</p>
<p>According to RedLock’s reports, other major firms like Gemalto &amp; Aviva faced the same issue. However, the Tesla incident was more important as it used a number of strategies as defense layers from being detected. RedLock also said that they notified Tesla about the issue and Tesla swiftly solved it.</p>
<p>This incident is a good example that shows how immature the cloud platform is. It&#8217;s a strong one, but yet to reach perfection when it comes to security. According to RedLock CTO Gaurav Kumar, the immaturity of the cloud platform may give a rise to the cryptojacking scenario.</p>
<p>Tesla said that it didn’t see any initial impact on the privacy &amp; protection of its vehicles and customers. As a prize, Tesla awarded the researchers $3,133.70. Tesla also has a bug bounty program like Google, Intel etc.</p>
<h3>What is cryptojacking?</h3>
<p>This incident is one of the many attack trends recently – cryptojacking. It’s a process where the hacker illegally sets a mining software on other’s computer and use the resource to mine money for him. Take a not that cryptocurrency mining is a very resource-heavy process. The processor of a computer works on the max level to continue mining.</p>
<p>Many hackers are presently trying to steal others’ computing power to earn some extra money. Why is that? The present market of cryptocurrency is super-hot. Take a look at Bitcoin – the most popular cryptocurrency. Currently, the price for 1 BTC is more than $10,000! It’s a huge factor playing role in the cryptojacking. For such a huge price, hackers are getting tempted to mine more and more cryptocurrency to earn money. That’s why they need the hardware – CPU’s processing abilities. The more processing, the more money.</p>
<p>Several websites even used a mining tool to use their visitors’ hardware and mine cryptocurrency as alternative revenue. If you want to stop hackers and websites to mine cryptocurrency on your system, take a look at <a href="https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/">how to stop cryptojacking</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tesla-cloud-account-data-breached/">Tesla Cloud Account Data Breached!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/tesla-cloud-account-data-breached/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cryptojacking from Android – Stay Secured</title>
		<link>https://www.osradar.com/cryptojacking-android-stay-secured/</link>
					<comments>https://www.osradar.com/cryptojacking-android-stay-secured/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 06:09:22 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[monero]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1834</guid>

					<description><![CDATA[<p>The market of cryptocurrency is seeing a huge fluctuation in the price. Take a look at Bitcoin, the price of every Bitcoin is a lot higher than the previous years. Bitcoin is currently seeing a downfall and experts say that the price of other cryptocurrencies is going to be higher. That is leading hackers to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-android-stay-secured/">Cryptojacking from Android – Stay Secured</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The market of cryptocurrency is seeing a huge fluctuation in the price. Take a look at Bitcoin, the price of every Bitcoin is a lot higher than the previous years. Bitcoin is currently seeing a downfall and experts say that the price of other cryptocurrencies is going to be higher. That is leading hackers to mine cryptocurrencies as much as possible. In this attempt, hackers have released infected Android apps that mine cryptocurrencies on your Android device, especially Monero.</p>
<p>Kaspersky researchers spotted several fake antivirus &amp; porn apps for Android that are malware infected. Those apps are used to mine Monero, launch DDoS attacks and also perform other malicious tasks. All of these actions caused the infected phones drain the battery a lot faster and eventually, bulge out of the cover.</p>
<p>Security researchers at Chinese IT security firm Qihoo 360 Netlab identified another malware. This wormable malware scans for wide-range of IP address for finding out any more vulnerable devices to infect them. The malware uses the infected devices to mine Monero. This one is named “ADB.Miner”.</p>
<p>The researchers told that “ADB.Miner” is the first of the kind of Android worm that uses the scanning code programmed in Mirai – the infamous IoT botnet malware. This malware caused major IoT companies offline last year by performing massive DDoS attacks against DynDNS.</p>
<h3>How the malware works</h3>
<p>ADB (Android Debug Bridge) is a command line toolkit for devs to debug Android code on the emulator and grants some of the most sensitive features of the operating system. Almost all the Android devices come up with ADB port disabled. So, how does the malware work?</p>
<p>“ADB.Miner” searches for Android devices – smartphones, smart TVs, TV set-top boxes – everything publicly accessible via the ADB debug interface. Those devices must be running over port 5555 to be infected. “ADB.Miner” installs a malware app that mines Monero cryptocurrency for its operator. That being said, the malware will only work on those devices that have been configured to enable port 5555 manually.</p>
<p>Additionally, the “ADB.Miner” tries to propagate itself into other devices from the newly infected devices.</p>
<p>Researchers aren’t completely sure how this malware is infecting Android devices. One thing for sure – this isn’t happening by exploiting any type of ADB flaw. The reason is, it’s infecting numerous devices from a wide variety of manufacturers.</p>
<p>The attack started on January 21, 2018, and has increased recently. Based on the IP addresses, the highest infected devices are from China (around 40%) and South Korea (around 31%), according to researcher’s estimation.</p>
<h3>How to stay protected</h3>
<p>In order to protect your Android device, be aware of using apps. Don’t install apps from any untrusted source. Be careful to install apps from Google Play Store at the same time. You can use a VPN or a firewall to block the port 5555. The best option is to get a good antivirus for your Android. Check out the <a href="https://www.av-test.org/en/antivirus/mobile-devices/android/">top Android antivirus from AV-Test</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-android-stay-secured/">Cryptojacking from Android – Stay Secured</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/cryptojacking-android-stay-secured/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
