• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
04 Dec

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

 At East African Data Handlers we have discovered that the  Slovakian software security firm Eset  uncovered that cyber criminals  are behind Cryptojacking Malware, the Stantinko botnet which has been distributed as a Monero (XMR) cryptocurrency mining module via Youtube.

We wish to warn the public to be careful. Further research indicate that, On Nov. 26, the major antivirus software supplier Eset reported that the Stantinko botnet operators have expanded their criminal reach from click fraud, ad injection, social network fraud and password stealing attacks, into installing Cryptojacking Malware on victims’ devices using Youtube.

Stantinko botnet has been active since at least 2012

The Stantinko botnet, which has been active since at least 2012 and predominantly targets users in Russia, Ukraine, Belarus and Kazakhstan, reportedly uses YouTube channels to distribute its Cryptojacking Malware module, which mines the privacy-focused crypto coin Monero on the CPUs of unsuspecting victims.

This cryptocurrency-stealing malware has reportedly infected around 500,000 devices, and is similar to the recently discovered malicious malware, Dexphot, malware discovered by Microsoft that has already infected more than 80,000 computers.

These crypto-hijacking codes steal processing resources, take over legitimate system processes and disguise the nefarious activity with the ultimate goal of running a crypto miner on the infected devices.

Eset informed YouTube, which reportedly responded by removing all the channels that contained traces of Stantinko’s code.

Malware on Monero’s official website was stealing crypto

In November, Monero’s core development team said that the software available for download on Monero’s official website might have been compromised to steal cryptocurrency. A professional investigator going by the name of Serhack confirmed that the software distributed after the server was compromised was indeed malicious:

“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”

 Be warned of this trend that  is now slowly coming to Africa. 

Courtesy of https://cointelegraph.com/

NEED HELP?

We are proud to provide you with full Data Recovery Service and Malware investigation services coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
27 Jan

What causes your computer to lose files?

What causes your computer to lose files?

As you use your computer, beware that you can lose your files at any time. Here are some situations and things that may cause you to lose your file:

Human error:

As a human being, you are bound to make a few mistakes here and there. One way this can occur is through accidental erasure. For example, let’s say you are working on a certain document and you accidentally hit the delete button. When a dialog box appears, you just click ‘OK’ and continue. You may have not noticed but probably you might have deleted a certain folder. It was done mistakenly and you probably did not know what was going on. Such situations happen and in this way you may end up losing your files.
Another way human beings can cause loss of files on your computer is by allowing other people to use your machine without access. They may come and delete some of your files, either deliberately or accidentally.

Viruses:

Viruses are programs written to bring about corruption of files, especially files stored in storage devices like hard disks and USB flash disks. Viruses can be gotten from the internet i.e. by accessing certain sites (especially porn sites), downloading certain free software, email attachments and also from external storage devices that are introduced to your computer . The virus will infect your computer files and thus will become corrupted. This is why in most cases when you look for certain files, they cannot be accessed. They are in a corruptible form. The worst part about computer viruses is that, like their medical counterparts, they replicate to infect many files.

This is one of the reasons why when purchasing a new computer , it is recommended to install anti-virus software to protect your computer against viruses.

Contact us now

If you’ve lost valuable, irreplaceable data  — We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
13 Jan

Computer Forensics Kenya Training

Gain knowledge in Computer Forensics Kenya Training

Did you  know that we offer Computer Forensics Kenya Training in IT security and Digital  Forensics. Well this is not a new area of study.  At East African Data Handlers we are please to announce that we do offer this course:

Some of the areas that we tackle in the training are for those searching for ( Ethical hacking training , Cyber security training

Also during the training you will be introduced to our services  of data recovery and how they relate to our work as a value added service offered by East African Data Handlers.

Our stretch of other services include

The following Devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data  in Ethiopia — We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya but have distributed offices all over East Africa.

Share this

© 2015  East African Data Handlers. All rights reserved.