When it comes to Trojans, everyone thinks they are hateful and abominable. In recent years, as the market for encrypted digital currencies has grown and prices have continued to soar, mining Trojans have occurred frequently, becoming a major acne in the security of the current network environment. Hackers use various means to invade private computers and public websites, use illegal control of computer computing power to mine for themselves, and steal encrypted currencies. Last year, the incident became more and more rampant. Although it was under control in the first half of this year, some "smart" hackers are still frequently active. Mining Trojan "Disguise Upgrade" Hackers can always find all kinds of strange resources to make profits. In recent years, most of the websites targeted by mining Trojans are irregular websites (some websites with no advertising revenue have built-in mining Trojans that use user computing resources for mining). What is more worth mentioning is that among all types of websites, pornographic websites are the first to be hit and have become the "first choice" for criminals to carry out mining attacks. Recently, Tencent Security released the "June Security Public Opinion Report" stating that mining Trojans and malicious attacks maintained high growth. Among them, mining Trojans disguised as "Chicken Eating" auxiliary software targeted game users, causing panic among a large number of users. The report shows that Tencent Yujian Threat Intelligence Center monitored that the author of the "xiaoba" ransomware virus provided "Wild Action" game assistance on the website xiaobaruanjian.xyz, and hid the ransomware virus, mining Trojans, and tampering homepage Trojans in it. According to the report, there is another similar case of "tlMiner" mining Trojan. Its author implanted the "tlMiner" mining Trojan in programs such as "Chicken Eating" game plug-ins, Dolphin Accelerator (modified version), high-imitation pirated video websites (dy600.com), and Cool Art Film and Television Internet Cafe VIP, and spread his personal mining through channels such as Internet Cafe Alliance, forums, download sites, and cloud disks. From this, it seems that the mining Trojan has once again "upgraded its disguise". When users open the above sites and plug-ins, the computer CPU usage will instantly soar to 100%, providing computing power for the website to generate revenue and becoming a miner for hackers. In addition, hackers are good at using hot spots to implant malware. Take June as an example: after the college entrance examination, many college websites (the official websites of many key universities in Shandong, Hubei, Henan, Heilongjiang, etc. were implanted with mining Trojans) were hacked. Candidates had to contribute to the hackers when checking their test scores. According to monitoring by the 360 Security Center, a Nordic tourism promotion website officially sponsored by the Swedish Tourism Board was implanted with mining code. According to relevant media statistics: more than 30,000 websites have built-in mining codes, and about 500 million computers around the world have been hijacked for mining. Although the price of well-known virtual currencies such as Bitcoin has fallen, the mining Trojans have also experienced a trough period, but the frequency of popular malicious attacks in June has generally shown an upward trend. Some experts pointed out that, in the final analysis, one of the main reasons for the outbreak of mining Trojans in recent years is the high cost of mining, such as the electricity of mining machines, which has also risen with the sharp rise in the price of coins in the past two years. Secondly, using plug-ins for mining is easier to operate and easier to invade, and it can also avoid the detection of security software. In order to seek greater personal gain, hackers unscrupulously put their "hands" into private computers and public websites, and they became more rampant after tasting the sweetness. However, this practice is always an illegal way. Judging from the current trend, I believe that it will be eliminated by new measures in a short time. |
<<: Nvidia's mining-related revenue dropped by about 94% in the second quarter
In the palmistry illustrations, there are many pal...
After ICO was defined as illegal fundraising in C...
Everyone is special, and everyone's palms are...
Activity theme: AntPool Ethereum Mining, Enter Yo...
Russian media said that many experts believe that...
When it comes to the so-called face of a man, it ...
Which spouse is more likely to cheat on you based...
What kind of palm lines will restrain the other h...
Women are naturally petty, but some women can con...
1. According to the Haikou Daily, the Hainan Deve...
Every woman hopes that she can find a good home a...
According to cryptovest, Bitcoin miner Coinmint i...
Bitcoin startup Everledger has joined a startup a...
Since ancient times, we have followed the rule th...
The so-called ball-shaped forehead actually refer...