Throwback Thursday: Malware taking a bit(coin) more than we bargained for

Posted by   Martijn Grooten on   Feb 1, 2018

In late spring of 2011, a sudden rise in the price of Bitcoin – reaching almost US$30, up from less than $1 barely a month earlier – attracted the attention of malware authors. They added mining capabilities to their malicious creations and made them look for Bitcoin wallets, while many websites added JavaScript code that used visitors' CPUs to mine for Bitcoin.

Bitcoin-malware-fig2.jpgFluctuating value of BTC in $USD.

The situation is surprisingly similar six and a half years on, as the meteoric rise in value of many cryptocurrencies in late 2017 has once again attracted the attention of malware authors. Though for mining purposes other cryptocurrencies (most notably Monero) are more efficient, many of today's malware campaigns deliver miners, and many compromised websites have visitors' devices engage in in-browser mining.

A report published this week by Cisco Talos looked at how extremely profitable such activities can be.

One of the earliest papers that looked at malware families targeting Bitcoin was presented at VB2012 by Microsoft researcher Amir Fouda. For this week's Throwback Thursday, we publish Amir's paper in both HTML and PDF format.

Throwback-Thursday-VB.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.