At this stage in the development of cryptocurrencies, creating and distributing malware that uses your computer's CPU while you are visiting web pages or watching YouTube videos has become a popular practice. This practice even got its own name - cryptojacking. Typically, these malware (which are often used to mine Monero) stop working when you close your browser.
However, newer, more aggressive malware has recently been discovered that crashes your computer when you try to neutralize it.
Researchers at 360 Total Security reported that malware called “WinstarNssmMiner” tried to infiltrate approximately 500,000 personal computers in just three days. This virus used emails and compromised websites to gain access to computers.
After downloading, the virus launches “svchost.exe” - a script that is used to control the basic functions of the PC operating system. A script is then injected with malicious code, which allows other applications to run smoothly in the background to avoid detection.
If WinstarNssmMiner successfully completes this part of the operation, its next step is to make changes to the “Critical Process” function of the personal computer. Thus, malware can crash a computer system at any time.
However, it is also worth mentioning that WinstarNssmMiner looks much more dangerous than it actually is. The fact is that before installation, the malicious program scans the PC for anti-virus software. According to ZDNet, if the virus is detected by Avast or Kaspersky, it does not even begin installation.
If the computer is protected by weak anti-virus software, or there is no such software at all, WinstarNssmMiner will take over the entire central processor. In this case, the computer owner gets into trouble.
"Many experienced users are able to recognize and stop malware. As a result, the developers of WinstarNssmMiner have protected it by configuring it so that infected computers crash when they try to terminate the malware."
According to https://www.financemagnates.com
You May Also Like
Hackers Place Monero Ransom Demands Inside DDoS Traffic
After several months of calm, DDoS hackers became active again and began to destroy websites. Recently, attackers have carried out a number of attacks using a new method of overloading victims' servers with fake traffic. To make attacks more powerful, hackers began using servers that help speed up sites - CDN servers for distributed caching in RAM.
Twitter blocks profiles of cryptocurrency scammers
The social network has already blocked even several well-known verified accounts, which is already too much to start the fight against Twitter scams, CoinDesk reports.
