How polite: Fun-bucks coin miners graciously ease off CPU pounding | 6/28/2018 | Staff
gemini2323gemini2323 (Posted by) Level 3
Click For Photo:

Cryptocurrency-mining malware writers are dialing back their use of your compute cycles in order to avoid detection.

This is according to Johannes Ullrich, head of research at SANS, who today pointed out that malicious mining apps are scaling down activity and employing built-in encryption to make them harder for antivirus packages to detect.

Cryptocoin - Miners - Try - Greedy - CPU

"The latest cryptocoin miners I have seen try to make it a bit more difficult to detect them by being less greedy and not asking for all the CPU cycles at once," Ullrich said.

"They also take better advantage of some newer CPU features like AES support."

Ullrich - Strain - Malware - Execution - Exploit

Ullrich spoke out after a fresh strain of malware was found to be using a remote-code execution exploit for a vulnerability in Apache Struts. The payload included a particularly nasty bit of code that takes over the host server to mine crypto-coins for a wallet controlled by the attacker.

As Ullrich...
(Excerpt) Read more at:
Wake Up To Breaking News!
Sign In or Register to comment.

Welcome to Long Room!

Where The World Finds Its News!