Five thousand computers turned into "black labor" for mining

Five thousand computers turned into "black labor" for mining

Text | Kyle

Editor | Wen Dao

The rise of the cryptocurrency industry has not only brought about an emerging market, but also attracted profit-seeking black market gangs, one of which is mining Trojans.

Recently, Tencent Security's Threat Intelligence Center published a post saying that they have detected the "LaofuMiner" mining Trojan spread through social engineering scams. Attackers disguised the remote control Trojan program as "hot news" or "pornographic content" and spread it on the Internet. Those who accidentally click on it will be immediately infected, and their computers will become abnormally slow, becoming miners for the black industry gangs.

According to statistics, the "Tiger" Trojan has infected more than 5,000 computers. Through tracing back to the source, it was found that the predecessor of "Tiger" was the "Grizzly" Trojan that appeared in 2018. At that time, "Grizzly" had infected nearly 100,000 hosts and obtained at least 380,000 yuan of illegal income by mining Monero.

In addition to "Grizzly" and "Tiger", other Trojan mining programs such as KingMiner, BlueHero, and "Fast Go Miner" are common. A security expert revealed that since some Trojans have been open sourced in the black industry, the cost of doing evil has been reduced, the harm of the virus has increased, and everyone may become a "victim".

Industry insiders have called for industry builders to jointly resist malicious behavior, strengthen security popularization, and improve safety factors when developing the cryptocurrency industry.

Trojan horse attacks, turning 5,000 computers into "mining machines" in seconds
Zhao Lu, a company clerk, clicked and moved the mouse impatiently, but the mouse arrow refused to obey his commands and moved at a snail's pace on the computer screen, leaving a series of double images.
The day before, the computer was working fine, but suddenly it "became a brick", Zhao Lu was very anxious. He opened the resource manager and found that the CPU usage rate reached 97%. He did not run any large software, and he restarted it many times, but the problem was still not solved.
Zhao Lu, who encountered a serious computer system freeze, did not know that the computer's high-speed CPU was performing a large number of calculations to "mine". This was an industry that was somewhat far from his understanding - cryptocurrency mining. In the past decade, this industry has been popular in a not-so-large cryptocurrency circle.
There are many people who have the same experience as Zhao Lu. They are distributed in Beijing, Guangdong, Shanghai, Henan, Shandong and other places. They start mining as soon as they turn on their computers, and the coins they mine fall into the wallets of black production gangs.
These computers were infected with a Trojan virus that has been popular recently. Tencent Security Yujian Threat Intelligence Center (hereinafter referred to as "Tencent Yujian") found through layer-by-layer analysis that the self-built mining pool used by the black industry gangs for mining contained the characters "laofubtc", so they named it the Tiger Mining Trojan.
According to Tencent Yujian statistics, as of December 5, the Tiger mining Trojan has infected more than 5,000 computers. The attacker disguised the remote control Trojan program as "hot news", "pornographic content", "private information", "fraud skills" and other file names, and sent them to the target computer through social networks. After the victim double-clicked to view the file, the remote control Trojan would be immediately installed.
The attackers then used remote control Trojans to control the infected computers and download mining Trojans, turning these computers into "miners".
Judging from the method used, this was an indiscriminate attack spread on social networks.
Tencent Yujian summarized some phishing attack file names, including "A gaming company was attacked", "Young lady's video", "Member information" and "Voice changer". These eye-catching file names have no direct connection with the cryptocurrency industry. After the owner of the infected computer clicks on them out of curiosity, he may become a "black laborer" who helps the black industry gangs make money.

Some phishing attack file names (Source: Tencent Yujian)
Tencent Yujian revealed that the virus attackers are very cunning. After the mining trojan file is implanted in the computer, it will disguise itself as the audio equipment company "Waves Audio". After the first execution, it will be "fattened" to 150MB with junk data to evade antivirus software detection.
The mining machine program files are disguised as drivers from NVIDIA, a graphics card manufacturer. Generally speaking, computer users believe that NVIDIA's drivers are safe and necessary and will not be deleted at will, so it is difficult to detect and deal with them.
At present, it is not known what coins the above-mentioned black industry gangs mined through the "Tiger Trojan". Although the characters "laofubtc" appeared in the mining program, people in the crypto industry believe that it is unlikely to use computer CPUs to mine Bitcoin (BTC). "The era of computer mining Bitcoin has long passed. A distributed mining pool composed of more than 5,000 computers may not be as good as dozens of good mining machines."
The "Grizzly Bear" mutant black industry gang continues to commit evil

Tencent Yujian's source tracing query found that the file server baihes.com of the "Tiger" mining trojan points to the IP address 46.4.156.44. This IP address attracted the attention of security experts in 2018, when a mining trojan named "Grizzly Bear" BearMiner, whose domain name miner.gsbean.com was also directly related to the above IP address.

Tencent Yujian speculates that "Grizzly" and "Tiger" belong to the same group, and "Tiger" has replaced the "Grizzly" mining Trojan, showing a new active trend.

In July 2018, Sangfor security experts (hereinafter referred to as "Sangfor") first exposed the "Grizzly" mining virus. The disguise method of "Grizzly" is similar to that of "Tiger", which can bypass mainstream antivirus software and lurk for several months.

"Grizzly" is more harmful. According to Sangfor statistics, "Grizzly" has infected nearly 100,000 hosts. Most of the poisoned hosts show abnormal lag, which seriously affects the host performance.

Sangfor classified the virus's hazard level as "high risk" and the difficulty of detection and killing as "difficult". It was revealed that the coins mined by "Grizzly" at that time were mainly anonymous coins Monero (XMR). Unlike Bitcoin, Monero has a low threshold for mining and is easy to use. You can use a home computer to mine through the CPU and graphics card.

In addition, since all Monero transactions use hidden addresses to protect the privacy of the recipient, it is difficult to track the whereabouts of the coins mined by the black market gangs.

According to the statistics of Sangfor in July last year, the Grizzly virus mined 420 Monero coins at that time. Based on the currency price of 927 yuan at that time, the attacker earned more than 380,000 yuan through illegal mining by the Trojan virus, and the cost was not high.

In the black market, the remote control Trojan named "Big Bad Wolf" is a popular remote control tool. The "Tiger" virus also implants viruses into the victim's computer through this remote control tool.

It is said that the original author of "Big Bad Wolf" has passed away, but the relevant code has been circulated in the black industry circle and shared as open source. After different virus and Trojan horse gangs customized and modified it, many variants were derived, which invisibly reduced the cost of black industry gangs to develop viruses.

In addition to "Grizzly" and "Tiger", in recent years, KingMiner mining Trojan, BlueHero mining worm virus, "Quick Go Miner" and other Trojan programs are common. At the end of 2018, the Shigu Branch of the Hengyang Public Security Bureau in Hunan Province also cracked a virus mining case. A computer science graduate installed Trojans on Internet cafe computers and made a profit of over 100 million yuan through remote mining.

Schematic diagram of the “Tiger” virus invasion (Source: Tencent Yujian)

In today's social network, people are exposed to a large amount of information every day. If you are not careful, you may become a "mining coolie" for hackers. When you find that your computer suddenly freezes severely, your computer may be busy creating improper profits for others.

Security experts advise Internet users not to open files of unknown origin at will. Before opening a file, it is recommended to open the Explorer folder option and "view known file extensions". When you find that the file icon is an Office, music, or video file, and the file extension is "exe, com, pif, bat", you can immediately identify it as a dangerous file and delete it immediately and use antivirus software to kill it.

The rise of blockchain and digital currency has made mining a new industry that is gradually prospering. Profits often breed evil, and mining Trojans, hackers stealing coins, dark web transactions and other incidents are emerging one after another. "Black industry" is also the "back side of the coin" of this emerging industry.

Industry insiders have called for industry participants to jointly improve their security technology reserves and jointly resist the evil activities of hackers and black industries when new technologies and new industries are first born. Professional security teams may wish to set up a security alliance to popularize basic cybersecurity knowledge to the public, strengthen the publicity and early warning of new viruses, so as to prevent the public who do not understand cryptocurrencies from becoming "black laborers" in mining.

<<:  Wu Jihan uses three tricks, can Bitmain return to glory?

>>:  ETH Hard Fork is Coming, What Miners Need to Know?

Recommend

The face of a woman who loves money and face

If some women love money and face, then what char...

What does it mean when there is a vertical line between the eyebrows?

In physiognomy, the area between the eyebrows is ...

What are the special moles on the back of the neck? What's the saying?

Moles grow in various parts of our body, especial...

Which types of people have the most wealthy features?

Everyone hopes to be happy and have a good life, ...

Innovators who will revolutionize the future - Undersea World

The biggest advantage of the underwater world is ...

How to read women's palms and get a complete guide to marriage

Marriage is very important to women. After all, a...

Do men with phoenix eyes have good fortune?

Who do you think of when you think of a man with ...

What happens when the love line forks into the wisdom line?

If we open our palms, we will find that each of u...

How to tell if a woman has a good face How to tell if a woman has a good face

1. A woman with a full forehead has a good appear...

Computing power package 0 yuan experience, free when you register

Registration direct link: http://www.hashcow.cn/a...

What is the fate of being born in 1951?

In life, everyone is born with his or her own bir...

Why the US SEC’s Change of Attitude on Ethereum ETF is Purely Political

summary On Monday, the SEC’s Division of Trading ...