Security

The Malware That’s Stealing Your Bitcoins (and How to Stop It)

A previously unidentified type of Bitcoin miner malware that’s been operational since 2013 just revealed itself to the global public. The program has infected computers in Brazil, Canada, the United States, and Peru, the latter of which was most severely affected. In total, the attack has generated more than 138 Bitcoins in profit for the culprits. For those who don’t know, that’s about $284,322 BRL, or $88,663.62 USD. How did the malware pull it off? With a botnet, a massive network of thousands, or even hundreds of thousands of infected computers.

Although the specific malware used in this attack is relatively new, Bitcoin theft is not. Since the cryptocurrency was created, malicious hackers have invented malware programs designed to rob Bitcoins from unsuspecting (and often unprotected) individuals. In 2014 alone, the U.S. tech security firm Dell Secureworks discovered approximately 80 different types of malware made specifically to procure Bitcoins.

How Bitcoin Stealing Malware Works

These programs work in several ways, and a fair amount of them can be operated by people with little to no experience in coding or programming. All they have to do is buy cheap, effective tools that can target vulnerable devices. In the hacker underground, someone can purchase PredatorPain, a highly infectious piece of malware that functions as a file, and credential-stealing Trojan program, for about $144 BRL (or $44 USD). Another program, SovietMiner, is designed to steal wallet files, and force infected devices to mine Bitcoins.

More specifically, it adds transaction records to Bitcoin’s public ledger of past transactions for the hacker’s profit. The latter costs about $48.89 BRL ($15 USD) per month. With general wallet-stealing malware, the virus searches for wallet files stored on the victim’s computer, and subsequently uploads applicable files to a remote server, where the hacker can extract the keys from said files, and obtain coins by signing a transaction to transfer the money to their account.

Safety First

Malware programs can infiltrate computers in several ways, but the most common method is to bug USB drives. The malware hides folders and files on the USB, replaces them with shortcuts, and effectively controls the infection of other devices that connect to the USB port.

While all this information may seem daunting, you should know that it’s within your means to protect yourself from these data breaches, and online attacks. By installing PSafe Total on your Android phone, you give yourself everything you need to defend your device from this sort of infectious malware. Don’t hesitate, and do what you can to protect yourself today.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago