Cyber Criminals Are Using YouTube To Install Cryptojacking Malware
Cyber Criminals Are Using YouTube To Install Cryptojacking Malware
Cyber Criminals Are Using YouTube To Install Cryptojacking Malware
At East African Data Handlers we have discovered that the Slovakian software security firm Eset uncovered that cyber criminals are behind Cryptojacking Malware, the Stantinko botnet which has been distributed as a Monero (XMR) cryptocurrency mining module via Youtube.
We wish to warn the public to be careful. Further research indicate that, On Nov. 26, the major antivirus software supplier Eset reported that the Stantinko botnet operators have expanded their criminal reach from click fraud, ad injection, social network fraud and password stealing attacks, into installing Cryptojacking Malware on victims’ devices using Youtube.
Stantinko botnet has been active since at least 2012
The Stantinko botnet, which has been active since at least 2012 and predominantly targets users in Russia, Ukraine, Belarus and Kazakhstan, reportedly uses YouTube channels to distribute its Cryptojacking Malware module, which mines the privacy-focused crypto coin Monero on the CPUs of unsuspecting victims.
This cryptocurrency-stealing malware has reportedly infected around 500,000 devices, and is similar to the recently discovered malicious malware, Dexphot, malware discovered by Microsoft that has already infected more than 80,000 computers.
These crypto-hijacking codes steal processing resources, take over legitimate system processes and disguise the nefarious activity with the ultimate goal of running a crypto miner on the infected devices.
Eset informed YouTube, which reportedly responded by removing all the channels that contained traces of Stantinko’s code.
Malware on Monero’s official website was stealing crypto
In November, Monero’s core development team said that the software available for download on Monero’s official website might have been compromised to steal cryptocurrency. A professional investigator going by the name of Serhack confirmed that the software distributed after the server was compromised was indeed malicious:
“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”
Be warned of this trend that is now slowly coming to Africa.
Courtesy of https://cointelegraph.com/
NEED HELP?
We are proud to provide you with full Data Recovery Service and Malware investigation services coverage to any part of Kenya; Nairobi, Mombasa, Kisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard Drives, Laptops, Desktops, Raid Systems, RAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc
East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.
Contact us now
If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands
All Categories
- Backup
- BUSINESS EMAIL COMPROMISE ATTACKS
- Cloud back up services in Kenya
- Cloud Computing
- Computer Forensics
- Cyber Attacks
- Data Loss
- Data Recovery
- Data Recovery Cost
- Data recovery in Nairobi
- Data recovery in South Sudan
- Data recovery in Uganda
- Data Recovery Kenya
- Data Recovery Rwanda
- Data RecoveryKenya
- Database Recovery
- Design
- Desktop Recovery
- DIGITAL FORENSIC LABORATORY(DFL)
- Digital Forensics
- Digital Forensics Kenya
- Digital Photo Data Recovery
- Email Data recovery
- File Data Recovery
- Hacking
- hardriver Recovery
- Laptop Data recovery
- Mobile Data recovery
- Network and Security Services
- Phone Data Recovery
- Raid Data recovery
- Raid Recovery In Kenya
- Ransomware
- Ransomware Attacks
- Ransomware Removal Services
- Server Recovery
- Services
- Solid State Drive Data Recovery
- Technology
- Uncategorized
- Virtual PBX Cloud Services
- Virus & Malwares
- WebHosting