{"id":12531,"date":"2018-06-11T07:00:01","date_gmt":"2018-06-11T15:00:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/11\/news-6300\/"},"modified":"2018-06-11T07:00:01","modified_gmt":"2018-06-11T15:00:01","slug":"news-6300","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/11\/news-6300\/","title":{"rendered":"Don\u2019t Be a Coinmining Zombie \u2013 Part 1: Getting Cryptojacked"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 11 Jun 2018 13:00:39 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"188\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-300x188.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-300x188.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-640x400.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-440x275.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-380x238.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When your computer or mobile device (and now, even your <a href=\"https:\/\/securityintelligence.com\/news\/crypto-mining-iot-attacks-among-top-internet-security-threats-in-2018\/\">IoT device<\/a>) is hijacked to secretly mine cryptocurrencies, it\u2019s been <em>cryptojacked<\/em> and becomes a <em>coinmining zombie<\/em>. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other zombies, to make money in the currency. Cryptojacking not only increases the wear and tear on your PC or Mac; if it\u2019s a mobile device it can overheat and swell the battery, even destroy the device itself. Not a good payment for all that service!<\/p>\n<p>So how do you get cryptojacked? And what can you do to prevent it?<\/p>\n<h3>What is cryptocurrency, anyway?<\/h3>\n<p>First, a refresher, to clarify the security issues.<\/p>\n<p>A <em>cryptocurrency<\/em> is a digital currency \u201cdesigned to work as a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Medium_of_exchange\">medium of exchange<\/a>,\u00a0that uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/Strong_cryptography\">strong cryptography<\/a> to secure financial transactions, control the creation of additional units, and verify the transfer of assets.\u201d (See <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\"><em>Cryptocurrency<\/em><\/a>, Wikipedia) Unlike electronic or printed currencies produced by central banking systems, cryptocurrencies use peer-to-peer networked decentralized computers\u2014distributed ledgers, typically <em>blockchains <\/em>(explained below)\u2014to serve as the public databases that process and verify the transactions conducted in the currency.<\/p>\n<p>First released in 2009, <a href=\"https:\/\/bitcoin.org\/en\/\">Bitcoin<\/a> is generally considered to be the first cryptocurrency. Since then, over 4,000 alternative currencies have been created\u2014and some of them, like <a href=\"https:\/\/ethereum.org\/\">Ethereum<\/a>, <a href=\"https:\/\/ripple.com\/\">Ripple<\/a>, <a href=\"https:\/\/litecoin.org\/\">Litecoin<\/a>, and <a href=\"https:\/\/monero.org\/\">Monero<\/a>, are very active among <a href=\"https:\/\/coinmarketcap.com\/all\/views\/all\/\">a list of over 1500 cryptocurrencies<\/a> in circulation today. Companies like Microsoft, Dell, Virgin Galactic, Shopify, and Tesla, as well as others (the list is growing) are now among the <a href=\"https:\/\/www.insidermonkey.com\/blog\/13-major-retailers-and-services-that-accept-bitcoin-in-2018-619766\/\">companies accepting Bitcoin and other cryptocurrencies<\/a>. Countries like the US, South Korea, Hong Kong, and Japan, as well as \u00a0Australia, are now among the <a href=\"https:\/\/steemit.com\/cryptocurrencies\/@ahmedsteem\/countries-that-accept-and-regulate-cryptocurrencies\">countries accepting and regulating cryptocurrencies<\/a>. This list too is growing, though some countries have refused to recognize cryptocurrencies or have banned them altogether (see <a href=\"https:\/\/blogs.thomsonreuters.com\/answerson\/world-cryptocurrencies-country\/\"><em>Cryptocurrencies by Country<\/em><\/a>, Dividends Magazine, 25 Oct 2017).<\/p>\n<h3>Next, what is cryptocurrency mining?<\/h3>\n<p><em>Cryptocurrency mining<\/em> (aka <em>coinmining<\/em> for short) is the way transactions are processed and verified over the peer-to-peer network by the cryptocurrency\u2019s <em>coinminers<\/em> installed on innumerable users\u2019 computers. Each set of transactions are processed as a \u201cblock\u201d then added to the \u201cblockchain\u2014the public ledger\u2014when they\u2019re confirmed by a <em>cryptographic hash<\/em> (a fixed-sized alphanumeric string) generated by the miners. The blockchain is then ready for the next block. The coin-owner\u2019s private key or <em>seed<\/em> in their cryptocurrency wallet is what identifies the ownership of the coins, seals the transaction for the specified amount, and prevents the transaction from being altered\u2014as verified by the hash. The miners that first calculate the hash, before any others, are rewarded with free currency units\u2014hence the high processing power required to do this quickly (usually, in about ten minutes). To that end, mining can be done by one or more big computers with lots of processing power and high-end graphic cards (GPUs); or it can be done in a pool by many smaller mining computers working simultaneously across the network. Legitimate mining pools may be set up by partners who share any profits by calculating the precise contribution of each of the participating miners in creating the cryptographic hash.<\/p>\n<h3>How do you become a coinmining zombie?<\/h3>\n<p>That said, it\u2019s not just legitimate entrepreneurs who use pools of computers to mine cryptocurrencies. <em>Transgressive<\/em> or <em>criminal<\/em> coinmining can occur whenever your computer and others are \u201chijacked\u201d (i.e., <em>cryptojacked<\/em>) to mine without your permission.<\/p>\n<p>Trend Micro identifies three types of cryptojacking in use today, (apart from the outright theft of cryptocurrency from the wallet that contains it, which can also occur):<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Web coinminers.<\/strong> Some websites now incorporate known <em>transgressive web coinminers<\/em>, as in the now infamous example of the publicly-advertised CoinHive miner installed on PirateBay. Sold by the CoinHive creators as a clever alternative to using website ads, when users clicked anywhere on PirateBay, a popup would initiate a coinmining process, significantly increasing the CPU usage of the visitor\u2019s machine via the Javascript coinminer. <em>Hidden web coinminers<\/em> take this process a step further, allowing aggressive or criminal attackers to compromise a site for coinmining in a clandestine way, even after you close your browser. They do this by minimizing the browser behind the Windows Taskbar, to persist in the mining at a reduced processing rate, so you may not even notice it\u2014though your CPU usage remains higher than normal.<\/li>\n<li><strong>Local coinminers.<\/strong> In this case, a fake app masquerading as an update installs a coinminer on your computer, as with the <a href=\"http:\/\/www.malware-traffic-analysis.net\/2018\/01\/02\/index2.html\">Fake Flash Player Updater<\/a> you might install because a malicious popup tells you that you need it to make the website work properly. Another example is <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/monero-mining-hiddenminer-android-malware-can-potentially-cause-device-failure\/\">HiddenMiner<\/a>, which poses as a legitimate Google Play update app that continuously mines the Monero cryptocurrency on Android, which can cause the device to overheat and potentially fail. It\u2019s similar to the\u00a0<u><a href=\"http:\/\/www.zdnet.com\/article\/this-crypto-mining-android-malware-is-so-demanding-it-burst-a-smartphone\/\">Loapi<\/a><\/u>\u00a0Monero-mining Android malware, which security researchers report can cause a device\u2019s battery to bloat.<\/li>\n<li><strong>Fileless coinminers. <\/strong>Finally, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/TROJ_POWLOAD.COINM\"><em>fileless coinminers<\/em><\/a> may be initially executed as a PowerShell script, which then propagates on the target machine using Mimikatz or EternalBlue for Lateral Movement, then Windows Management Instrumentation (WMI) for the exploit in the scanned network connection. This opens a persistent, asynchronous, fileless backdoor on your computer for the purposes of clandestine coinmining. The result, again, is increased CPU usage on your machine.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>So what do you do about such threats? Watch for <em>Don\u2019t be a Coinmining Zombie \u2013 Part 2: How Do You Protect Yourself from being Cryptojacked?<\/em><\/p>\n<p>Related Links:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-2018-new-menace\/\">Cryptocurrency-Mining Malware: 2018\u2019s New Menace?<\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-the-impact-of-cryptocurrency-mining-malware\">Security 101: The Impact of Cryptocurrency-Mining Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com\/cryptocurrency-mining-abuse-of-system-resources\/\">Cryptocurrency Mining: Abuse of system resources<\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/\">2017 Annual Security Roundup<\/a><\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cluster-of-coins-how-machine-learning-detects-cryptocurrency-mining-malware\/\">Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/dont-be-a-coinmining-zombie-part-1-getting-cryptojacked\/\">Don\u2019t Be a Coinmining Zombie &#8211; Part 1: Getting Cryptojacked<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/dont-be-a-coinmining-zombie-part-1-getting-cryptojacked\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 11 Jun 2018 13:00:39 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"188\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-300x188.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-300x188.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-640x400.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-440x275.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2-380x238.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/cryptoccurency-mining-malware-2.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it\u2019s been cryptojacked and becomes a coinmining zombie. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/dont-be-a-coinmining-zombie-part-1-getting-cryptojacked\/\">Don\u2019t Be a Coinmining Zombie &#8211; Part 1: Getting Cryptojacked<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10490,18678,10789,11052,16598,18679,10463,714],"class_list":["post-12531","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-bitcoin","tag-coinmining","tag-consumer","tag-cryptocurrency","tag-cryptocurrency-mining","tag-cryptojacked","tag-mobile-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12531"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12531\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12531"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}