East Of Seattle
No Result
View All Result
  • Login
  • Entertainment
  • Headlines
  • News
  • Movies
  • Lifestyle
  • Blogging
  • Business
  • Health
  • Jobs
  • Politics
  • Entertainment
  • Headlines
  • News
  • Movies
  • Lifestyle
  • Blogging
  • Business
  • Health
  • Jobs
  • Politics
No Result
View All Result
East Of Seattle
No Result
View All Result
Home News

Cryptojacking: a corrupted Google Translate mines cryptos on more than 100,000 PCs

Ajeet Nandwal by Ajeet Nandwal
September 4, 2022
Reading Time: 4 mins read
0
Cryptojacking: a corrupted Google Translate mines cryptos on more than 100,000 PCs

[ad_1]

Table of Contents

    • RELATED POSTS
    • Biden sends greetings to Buddhists across the world on Vesak
    • IWL: Mata Rukmani FC to face Gokulam Kerala FC on Sunday
    • US Special Coordinator for Tibetan Issues Uzra Zeya to visit India, Nepal from May 17-22
  • Cryptojacking: undetectable crypto mining
  • Corrupt “Google translate” software mines crypto without your knowledge
  • A methodical infection

RELATED POSTS

Biden sends greetings to Buddhists across the world on Vesak

IWL: Mata Rukmani FC to face Gokulam Kerala FC on Sunday

US Special Coordinator for Tibetan Issues Uzra Zeya to visit India, Nepal from May 17-22

With this fake Google translation software, this scammer managed to pocket a substantial jackpot in the greatest discretion. By infiltrating and installing mining software on more than 100,000 PCs, the scammer was able to build a veritable “clandestine” mining farm.

Cryptojacking: undetectable crypto mining

To steal cryptocurrencies, hackers redouble their ingenuity. With the recent speculative bubble around cryptos, the sector has become very lucrative, so many individuals have paid the price. These attacks can take various more or less well-known forms.

While attacks in the form of phishing are mainly recognizable, cryptojacking is also very widespread, but much less detectable.

Cryptojacking consists of hiding malicious software on a computer or smartphone to use it in the process of mining certain cryptocurrencies. Thus, by taking advantage of the computing power of your PC or phone, hackers pocket mining-related gains. The threat is to be taken very seriously, since to be efficient, the software must be invisible, therefore you can be infected without knowing it and without being particularly adept in the world of cryptocurrencies.

More than 100,000 PCs have recently paid the price…

Corrupt “Google translate” software mines crypto without your knowledge

Hidden under recognized applications like Google Translate, cryptojacking malware has managed to infect no less than 112,000 computers.

It is through a report by Check Point Research (CPR) that we learned the news last Monday. In particular, the cybersecurity research team said that the software has been exploiting a large number of computers for several years.

The malware that only uses the name “Google translate” has allowed hackers to use these thousands of machines to mine the Monero (XMR) cryptocurrency. The attack is not new since, under the radar, the software has been able to use the computers of the victims since 2019, and this, in 11 countries:

  • Israel
  • Germany
  • UK
  • United States
  • Sri Lanka
  • Cyprus
  • Australia
  • Greece
  • Turkey
  • Mongolia
  • Poland

As a result, although the infected machines are not necessarily real mining RIGs, we can imagine that the operation could nevertheless bring a jackpot to the pirates.

The “success” of the malware is partly explained by the fact that it has been integrated into replicas of known software such as YouTube Music, Google Translate or Microsoft Translate. Although there is no desktop version for Google Translate, according to the research team, these bogus software have been made available on reputable sites like Softpedia or Uptodown.

Benefiting from the visibility of several sites, the software rose quickly in the Google search results. Initially promoted by a Turkish software developer named “Nitrokod”, the “free and secure” software therefore spread to victims’ computers like wildfire.

A methodical infection

Once the malware is executed, the infection begins, and the installation of the malware is meticulous – taking several weeks to be effective… Precisely, the software begins to extract cryptos almost a month after installation.

The process is divided into several stages:

  • Installing in .rar allows attackers to download a package to build the files on the computer.
  • Once it is executed, the software does not contain anything alarming since it is generally an exact copy of the official version. Only, it already sends the information of the infected machine to the attacker.
  • After 4 restarts over a period of 5 days, the software proposes an update and executes the “update.exe” program, this is where the serious things begin…
  • Once the period has passed, the program will perform the 4 tasks above.
  • After several days of process (usually 1 month), the malicious cryptomining software as “powermanager.exe” runs.

The machine is then infected, “nitrokod” only has to extract the Monero crypto without the consent of the victims, and without them even noticing. Indeed, the almost invisible infection usually results in a slight slowdown of the system. If you want to know more, you can consult Check Point Research’s detailed report.

This event is a reminder of the threats that abound on the Internet. If you do not want to make your PC work on behalf of another, it is strongly advised to favor official sites when downloading any software in order to protect yourself from this kind of risk.

[ad_2]
This is Auto Posted article collected article from different sources of internet, EOS doesn’t take any responsibilities of this article. If you found something wrong in this article, please tell us.

Share30Tweet19
Ajeet Nandwal

Ajeet Nandwal

Related Posts

News

Biden sends greetings to Buddhists across the world on Vesak

September 14, 2022
News

IWL: Mata Rukmani FC to face Gokulam Kerala FC on Sunday

September 14, 2022
News

US Special Coordinator for Tibetan Issues Uzra Zeya to visit India, Nepal from May 17-22

September 14, 2022
News

Odisha Sports to face PIFA Sports in next IWL match

September 14, 2022
News

President Kovind meets Jamaican Leader of Opposition Mark Golding

September 14, 2022
News

Zeya’s Dharamsala visit crucial, dire need to preserve Tibetan culture before China wipes it out: ICT

September 14, 2022
Next Post
Tini Stoessel received unexpected joy

Tini Stoessel received unexpected joy

Netflix Series Arcane Wins Emmy for Outstanding Animated Program

Netflix Series Arcane Wins Emmy for Outstanding Animated Program

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Premier League: Burnley appoint former Man City captain Vincent Kompany as head coach

August 28, 2022

Dhadkan Movie Download Telegram Link [480p, 720p, 1080p, And HD]

May 13, 2022
After 22 years: Frank Plasberg leaves “hard but fair”

After 22 years: Frank Plasberg leaves “hard but fair”

August 17, 2022

Popular Stories

  • Over 80 Protesters Killed In Myanmar On Day Of Shame For Armed Forces

    Over 80 Protesters Killed In Myanmar On Day Of Shame For Armed Forces

    1134 shares
    Share 454 Tweet 284
  • The Family Man 2 Series Review

    1109 shares
    Share 444 Tweet 277
  • Introduce Your Parents to Web Series Through These Shows

    1011 shares
    Share 404 Tweet 253
  • If you love anime, you have to watch these 10 Animes!

    861 shares
    Share 344 Tweet 215
  • Top High Salary Paying Jobs in USA

    244 shares
    Share 98 Tweet 61
  • Privacy Policy
  • Fact Checking Policy
  • Ethics Policy
  • Corrections Policy
  • Ownership & Funding
  • Editorial Board

© 2022 East of Seattle - Your Information. Our Responsibility.

No Result
View All Result
  • Entertainment
  • Headlines
  • News
  • Movies
  • Lifestyle
  • Blogging
  • Business
  • Health
  • Jobs
  • Politics

© 2022 East of Seattle - Your Information. Our Responsibility.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In