Malware Drains Your Computer’s Resources Without Your Knowledge

January 25, 2019

Written by wukovits

Cryptominers are among the most common type of malware in the wild today, based on the latest research by digital security company Check Point.  While there are dozens of variants deployed by hackers, the cryptojacker “Coinhive” is the malware of choice this year.  Once installed on a computer, it works in the background siphoning off your computing power to mine Monero any time your computer is on and sending the gains to the hackers.

The second most popular is a piece of malware called Jsecoin, which is a JavaScript-based miner that can be embedded into websites and runs in a target’s browser.  Then there’s Cryptoloot, which is a Coinhive competitor and works in much the same way.

Although cryptojacking software dominates the top-ten list, they’re not the only types of malware on it, and this year’s list features two venerable contenders:  Emotet and Ramnit, both of which are banking Trojans that have been in circulation for a long time.

While all of these threats are bad, the one that’s getting a lot of attention from security professionals is a relative newcomer to the rankings called Smoke Loader.  Interestingly, Smoke Loader isn’t dangerous by itself, but then again, that’s not its real goal.  It’s a gateway malware.  A Trojan whose express purpose is to infiltrate a system and then download additional malware.

The specifics are entirely open-ended.  If a hacker using Smoke Loader to infiltrate a system wants to follow that attack up with a cryptojacker, he can do that.  If he’d prefer to launch a ransomware attack, he can do that too.  The sky is basically the limit.

In any case, the Check Point top-ten list is well worth a closer look, if for no other reason than to be sure your IT staff is up on all the latest threats.

Used with permission from Article Aggregator

Bayou Tech

We provide solutions for your business. Find out how we can help.

Related Articles

New Graphene Technology May Increase Hard Drive Storage

HDDs are old, well understood technology. They haven't changed much in recent years. In fact, increasingly, people are writing them off, preferring SSDs for their greater speed and smaller size, even though HDDs are less expensive. The clever folks at the University...

Some Amazon Device Features May Have Security Risks

Have you heard of Amazon Sidewalk? If not, it's definitely something you should be aware of. Depending on your point of view, the new feature, which was enabled by default on a wide range of Amazon devices by default on June 8 of this year (2021) is either...

Email Unsubscribe Scam Can Easily Fool Any User

Scammers are increasingly relying on a tried and true bit of social engineering to fool unsuspecting users into unwittingly signing up to receive a flood of additional spam email. They accomplish this by blasting out an email asking recipients if they wish to...

Send us a message

Your message was sent.