Click For Photo: https://regmedia.co.uk/2017/11/29/shutterstockcoalminers.jpg?x=1200&y=794
Cryptocurrency-mining malware writers are dialing back their use of your compute cycles in order to avoid detection.
This is according to Johannes Ullrich, head of research at SANS, who today pointed out that malicious mining apps are scaling down activity and employing built-in encryption to make them harder for antivirus packages to detect.
Cryptocoin - Miners - Try - Greedy - CPU
"The latest cryptocoin miners I have seen try to make it a bit more difficult to detect them by being less greedy and not asking for all the CPU cycles at once," Ullrich said.
"They also take better advantage of some newer CPU features like AES support."
Ullrich - Strain - Malware - Execution - Exploit
Ullrich spoke out after a fresh strain of malware was found to be using a remote-code execution exploit for a vulnerability in Apache Struts. The payload included a particularly nasty bit of code that takes over the host server to mine crypto-coins for a wallet controlled by the attacker.
Wake Up To Breaking News!