NFT Collection The Superlative Secret Society Price, Stats, and Review
3 Best Cryptos Under $0.50 with 50X Potential: BlastUP, Dogecoin, and BONK
Altcoin season approaching? Insights from experts amid Bitcoin’s halving aftermath
Landmark Exchange Auction: CoinEx “Epic Sat” Now in Progress
Ethereum On-Chain Health Holds Strong Amidst Open Interest Plunge – Impact On Price
Post-Halving Fallout: Bitcoin Hashprice Slides 30%, Miners’ Earnings Hit
Middle East Goes Crypto: 500,000 Daily Traders Fuel Market Boom
Price decline persists on Arbitrum, Cardano while investors look to Milei Moneda
Akash Network’s AKT rallies by 54% today as Algotech’s presale approaches $4m
Kèo chấp 1/ 4 là gì? Cách đọc kèo 0.25 chi tiết nhất Bongdadzo
LeGoat (LBJ) launches blockchain-based private social club
Bitcoin to $200K in ’18-24 months’ – What will drive the price?
Crypto Price Prediction 4/23: Altcoins to Watch as Post-Halving Recovery Gains Steam
Bitget Wallet’s Chief Operating Officer Presents Web3 Wallet Security Strategies at Blockchain Life Dubai
Developing Countries Need Decentralized Physical Infrastructure Networks – Karam Lakshman
Janet Yellen’s ‘Buy Bitcoin’ note hits $140k in online auction
Bitcoin’s post-halving behavior: trends and analysis
What Is FUD in Crypto?
Ripple Vs. SEC Update: Is The Lawsuit Finally Coming To An End With A Settlement?
SOL gains ground in crypto top tiers as Option2Trade eyes rapid growth
XRP Whales Move 70 Mln XRP Amid Ripple’s Decision To File Opposition, What’s Next?
Binance loses 25% of Bitcoin market share as offshore markets shrinks
Bitcoin and Solana prices dip as investors explore Raboo ICO
Riot’s Price jumps 23% on analysts’ bullish forecast
Monero-Mining Malware Found Embedded in Audio Files
Cybercrime is getting more profitable and, with this increased profitability, the need has arisen for hackers to become more innovative in their operations. As it is with the legitimate business scene, criminals are now thinking out of the box to stay ahead of the curve.
Cybersecurity firm BlackBerry Cylance released a research report which suggests that hackers have employed steganography, the art of concealing an item in another, as a part of their operations. Specifically, this new hacking method involves concealing malware into a WAV audio file to hide its malicious code and move past conventional detection methods.
The cybersecurity company revealed that each of these WAV files contains a loader component, which will go on to decode and execute malicious content in the audio files. Several threat actors were reportedly examined, with some even embedding JPEG and PNG files with their malware and sending them out.
Some malware attackers have also gotten their malware into WAV files. The malicious audio files were found to be embedded with XMRig, a mining malware used to mine privacy-focused crypto-asset Monero (XMR). The WAV files discovered by the firm also employed the same infrastructure — one which indicates the campaign employed to get remote access over the victims’ networks.
Hackers Love Monero
Hackers love stealing cryptocurrencies, but they like Monero (XMR) more than others. While malware attackers have been known to target Bitcoin (BTC) in the past, the progress made in tracking them through the asset has forced them to move to another asset; the privacy-focused XMR.
In June, researchers from cybersecurity firm Trend Micro were able to track Black Squid, a cryptojacking malware which they claimed was affecting computers across Thailand and the United States.
While measures have been taken to reduce the efficacy of cryptojacking and keep its effects to a minimum, the Black Squid malware definitely breathed new life to the criminal activity. After receiving a lot of activity reports, authorities in the two target countries put Black Squid into the limelight — and the reason for its popularity was soon recognized.
Black Squid
As BeInCrypto reported, the malware was able to employ several means to hack into computer systems. Thanks to its use of anti-virtualization, anti-sandboxing, and anti-debugging, the malware could take out any steps that could potentially alert victims of its presence.
In addition to that, the cybersecurity firm noted that the malware has worm-like propagation abilities, thus making it easy for it to infect other systems that are discovered on the same server as well. With such a potential to get processing power, its popularity amongst hackers was quite obvious.
What do you think about the improved methods used by the crypto jackers behind XMRig? What precautions do you take to stop yourself from falling victim to similar attacks? Let us know your thoughts in the comments below.
Images courtesy of Shutterstock.
The post Monero-Mining Malware Found Embedded in Audio Files appeared first on BeInCrypto.