Crypto mining malware has fallen since the closure of the crush



[ad_1]

With the prices of crypto, mining malware also has
recently, but not because of the bear market. According to new research, the
the chances that your browser is hacked are much smaller now than a major crypto
the plague is offline.

The cybersecurity firm Malwarebytes has revealed that crypto
mining attacks fell by 79% compared to the same period of the year
since. The report
added that the main reason for this decline was the closure of Coinhive
month.

"Marked by the popular mining collection company CoinHive, which ceased operations in early March, consumer cryptography seems to have followed the dodo path. Detections of consumer-focused Bitcoin miners have dropped significantly over the last year and even compared to last quarter, "he added.

Coinhive has allowed webmasters to install a script exploiting the computing resources of anyone viewing the website, often without their knowledge. This would allow them to earn a little more money by exploiting Monero secretly. As Coinhive grew, antivirus vendors started blocking scripts, which became very popular in 2017 and 2018.

Since then however, Malwarebytes has stated that the figures had
fallen dramatically; "We went from tens of millions of blocks to a
two million a day, "the company told PC Mag. Coinhive announced
his disappearance in February of this year, citing the ongoing bear market and has increased
difficulties in Monero mining because of the last XMR hark fork. Similar search
suggests that the profitability of Monero's mining has declined significantly
with its prices. At the time of writing, XMR was trading at $ 62, a long pullback
from his peak of nearly $ 500.

A number of similar scripts have appeared since that imitate
Coinhive. Instead of targeting compromised websites, new versions such as
CoinIMP and CryptoLoot use torrent portals or file hosting services. In
February false
version of Metamask
was found hidden on the Google Play Store. according to
Check Point security company, Coinhive scripts could be reactivated if
prices are rising again;

"Despite its closure, Coinhive's JavaScript code is still used on many websites. No mining is taking place, but if the value of Monero increases significantly, it is possible that Coinhive will come back to life ",

General Ledger detects desktop malware

In a related story, the crypto wallet provider that Ledger has detected
malware that targets his desktop application. The company warned users that the
a malicious software replaces the genuine software with a malicious version that asks
users enter their pbadword consisting of 24 words after a fictitious update.

WARNING: We have detected a malware that locally replaces the Ledger Live Desktop application with another malicious one. Infected computer users are prompted to enter their 24-word recovery phrase after a false update. Please refer to our security best practices https://t.co/MlAUlgoqj9 pic.twitter.com/Qzr3o4xaOq

– General Ledger (@Ledger) April 25, 2019

At the time, only Windows machines seemed to be infected
and the malware does not exploit or steal cryptocurrency. He tries to use
social engineering to entice users to give up their pbadphrase.

[ad_2]
Source link