Bitcoin malware

Comment

Author: Admin | 2025-04-28

Bitcoins without the users’ knowledge. During analysis, the grayware tried but failed to access a malicious link using a specific user name and password.WORM_OTORUN.ASH attempts to force infected systems to participate in a Bitcoin-mining pool service known as Deepbit. A Bitcoin mining pool refers to a network of Bitcoin miners that process the same block for faster payout. The Bitcoins generated through such a pool are then divided among the participants.How do Bitcoin-mining malware infections affect users?The Bitcoin mining process eats up a system's computing power. As such, infected systems sustain increased wear and tear from processing Bitcoin blocks. Infected systems work abnormally slow.Even though Bitcoin-mining malware do not appear to target specific individuals, cybercriminals may choose to infect systems with highly capable graphic processing units (GPUs) or video cards, as these process Bitcoins faster. As such, gamers and other users of graphics-intensive applications may be especially favored targets.What drives the proliferation of Bitcoin-mining malware?Cybercriminals always try to find new ways to monetize their malicious activities. Bitcoin generation allows them to do just that. Infecting others’ systems with Bitcoin-mining malware allows cybercriminals to make money without exerting as much effort. The fact that Bitcoin is slowly being recognized as a legitimate currency and that it has real-world value seems to be spurring greater cybercriminal interest.What makes Bitcoin-mining malware attacks noteworthy?Among the Bitcoin-mining-related malware we have seen so far, WORM_OTORUN.ASH is particularly noteworthy. The inclusion of Bitcoin-mining code may mean that cybercriminals are considering making Bitcoin mining a regular payload.Do Trend Micro products protect users from Bitcoin-mining malware?Yes, Trend Micro products protect users from the malware mentioned in this article. Backed by the Trend Micro™ Smart Protection Network™ infrastructure, Web reputation technology blocks users access to all of the related malicious URLs. File reputation technology, meanwhile, detects and deletes all known malware associated with involuntary Bitcoin mining.What can users do to prevent Bitcoin-mining malware from infecting their systems?Safe computing habits can help prevent system infection and involuntary Bitcoin mining:Do not download and install applications from unknown sites.Be wary of clicking shortened links on Twitter or any other site, regardless of source. URL shortening makes it difficult for a user to gauge a link’s legitimacy.Sudden unexplained system slowdown may indicate Bitcoin mining. Check it for clues of Bitcoin-mining malware infection like an unexplained increase in processing power usage.Invest in a security solution that can detect and prevent Bitcoin-mining malware from infecting your system.Expert Insights“Cybercriminals will continue to find ways to monetize their malicious activities. Bitcoin-mining malware attacks are just another means for them to do so. Bitcoin mining may have earned cybercriminal attention due to the fact that it represents a direct source of income.”—Roland Dela Paz, Trend Micro threat response engineer“In the early part of September, a Bitcoin was worth more than US$8. Should the value of Bitcoins rise, the number of Bitcoin-mining malware will also increase.”—Karl Dominguez, Trend Micro threat response engineer

Add Comment