ARTICLE
23 September 2019

Cryptomining Malware Found In Study Materials, Other Malware Uses Bitcoin To Proliferate

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
A global cybersecurity company recently reported that cryptomining malware hidden in digital textbook downloads was the second most common type of malware ...
United States Technology

A global cybersecurity company recently reported that cryptomining malware hidden in digital textbook downloads was the second most common type of malware spread under the guise of study materials. The malware, Win32.Agent.ifdx, is a program that opens a text file when launched to trick the user into thinking the file is benign. Once installed, the malware can download other pieces of malware, including cryptominers that allow hackers to generate profits through use of the host's processing power.

According to another recent report, the Bitcoin blockchain is being used by the Glupteba malware dropper to improve the malware's connection to command-and-control servers (C2 servers), which hackers use to control compromised systems. When a compromised system disconnects from a C2 server, hackers can use the Bitcoin network to replace C2 servers, allowing the compromised system to reconnect. The report noted that the Glupteba malware is also capable of implementing cryptomining and can steal browser data and passwords.

For more information, please refer to the following links:

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More