Linux Malware Evolves to Mine Cryptocurrencies
While cryptocurrency mining malware has generally been targeted at PCs running the Windows OS, owners of Linux-based machines are now experiencing a taste of malware misery too. Computer security company Symantec has identified a new version of an old worm that has been going after Linux-based routers and set-top boxes for some time. The Darlloz worm, as it is called, has evolved to attack Linux desktops and to press them into service as unwilling cryptocurrency miners, IDG News Service reports. Darlloz is a rather unusual piece of malware, as it was originally developed to wreak havoc on....
Related News
Rex Linux Trojan, an evolved malware capable of doing multiple things, including Bitcoin mining and DDoS attacks. The number of attacks on computers is increasing almost exponentially these days. The latest one to make news is the Rex Linux Trojan. This “Swiss knife” of a malicious program is a piece of work capable of running DDoS attacks, hold the infected computer for ransom (ransomware) and even mine Bitcoin without the user’s knowledge. Built on Google’s Go platform, the Trojan was first identified by cyber security firms three months ago. The earlier version of Rex Linux Trojan was....
A malware called Linux.Lady targets Redis servers that have been placed online without passwords and launches a cryptocurrency mining software, according to hackread.com. According to Dr. Web, a Russian software retailer, Linux.Lady uses Google’s Go programming language and targets Redis servers that lack passwords from systems administrators. Dr. Web claims the malware can collect information about an infected computer and send it to the C&C server, download it and launch a cryptocurrency mining utility, then attack more computers on the network. Turning Linux into Crypto Miners. The....
SophosLabs has published a report on how hackers are distributing a new mining malware across the web. The Mal/Miner-C malware hijacks a computer and allows malicious individuals to mine Monero with the victim’s processing power. SophosLabs Researches a New Exploit That Borrows CPU Power to Mine Monero. A new paper, authored by Attila Marosi, details how....
For many years, a lot of people assumed Linux was one of the most secure operating systems in the world. Due to its smaller market share, and completely different codebase from Windows, Linux has been rather safe from major virii and malware. However, there is one simple exploit that lets an assailant breach a Linux machine by pressing the backspace 28 times in a row. Two Spanish security researchers discovered this strange – and very unusual – Linux bug by tapping a specific key more than once in quick succession. Unlike in most cases where computers are involved, smashing the same button....
Cryptocurrency mining malware for PC platforms has been around for a while, but now it has gone mobile, specifically via the Android OS. A team of security researchers from Trend Micro has managed to identify two apps that can use your Android device to mine litecoin and dogecoin. The apps in question are called Songs and Prized, and both are available from the Google Play Store. Songs has between one and five million downloads so far, while Prized has 10,000 to 50,000 downloads. This is not the first case of mining malware targeting new and unusual platforms. Linux recently got what was....