Along with a spike in the cryptocurrency market, malicious mining software has been actively deployed by criminals in order to make easy money and became a major trend in 2017.
When someone urgently needs to edit a text document or an image, but doesn’t have the time or opportunity to find a trusted source, the most probable solution is to download the first openly distributed or even cracked application they can find, which are rife on the Internet. So, you successfully download and install the program and nothing wrong or suspicious is spotted in its operation. But suddenly, you notice that your PC seems to run much slower than usual and at the end of the month, you receive an electricity bill that is noticeably higher than average. If this sounds familiar, it’s likely that you’ve got a miner.
Along with a spike in the cryptocurrency market, malicious mining software has been actively deployed by criminals in order to make easy money and became a major trend in 2017. This trend was predicted in 2016 by Kaspersky Lab researchers who spotted a comeback of mining software amid the growing popularity of Zcash. Just a year later, miners are everywhere: according to Kaspersky Lab data, by the end of 2017, the number of affected users would exceed two million.
Criminals are using different tools and techniques, such as social engineering campaigns involving adware or cracked software, in order to affect as many PCs as possible. Kaspersky Lab experts recently identified a number of websites, created using one standard design, which have been offering users free, pirated software such as popular computer programs and applications. Taking into consideration how widespread pirated software is, it’s not a difficult task for criminals to generate a special “landing page”. They have even been using domain names similar to the real ones in order to confuse users as much as possible.
But it’s always wise to be careful when someone offers you something for nothing. The real purpose of these websites was to spread a particular mining software. As a result, in the chase for free applications users were putting themselves at a higher risk than they could have imagined. Along with the downloaded archive, users received a miner which was automatically installed together with the desired software. After this, the miner started silently operating on the victim’s PC, using its power to generate cryptocurrency which goes directly back to the criminals.
The installation archive also included text files containing initialisation information – an address of the criminals’ wallet, as well as a mining pool – a special server to unite several participants and distribute a mining task among their computers. In exchange, participants receive their share of cryptocurrency. Due to the fact that mining Bitcoins and other cryptocurrencies is currently a very resource-heavy and time-consuming operation, the pools provide increased efficiency and higher speeds of cryptocurrency production.
Kaspersky Lab researchers have identified that in all cases criminals used the NiceHash project software, which recently suffered a major cybersecurity breach resulting in the theft of millions of dollars’ worth of cryptocurrency. Some of the victims were connected to a mining pool of the same name.
There was one more interesting feature found by Kaspersky Lab experts, which enabled criminals to remotely change a previously set wallet number, pool or miner itself. Thus, criminals gave themselves an opportunity to distribute mining flows and change the final destination for crypto coins anytime they needed, or make a victim’s computer work for another mining pool.
“Although not considered malicious, mining software decreases the device’s system performance, which inevitably affects the user experience, along with increasing the victim’s electricity bill. As a result, the use of seemingly harmless pirated software leads to the victim – at their own expense – augmenting someone else’s wallet. We advise users to remain vigilant and use legal software to avoid such malicious handouts,” says Alexander Kolesnikov, Malware Analyst at Kaspersky Lab.
In order to protect yourself from such incidents and prevent your PC from turning into a mining zombie, Kaspersky Lab recommends the following:
Data journalism takes top prize in revamped awards
The entries to the 2018 Vodacom Journalist of the Year Awards were extraordinarily varied and of an excellent standard, with new categories introduced which are based on content as opposed to platforms. This year, the judges decided that two entries were equally worthy of the coveted Vodacom Journalist of the Year Award.
The first co-winning entry, in the new Data Journalism category, is a set of stories by Alastair Otter and Laura Grant of Media Hack which showed how Data Journalism is shaping the future. The second co-winning entrant is Bongani Fuzile of the Daily Dispatch for his articles in the investigative category on how migrant workers were being ripped off by pension deductions (full citations below).
Convenor of the judging panel Ryland Fisher says: “This year we modernised the 12 categories that journalists could enter their work in and the change was embraced by entrants. In a turbulent time for media, the 2018 entries once again proved that there are excellent South African journalists delivering praiseworthy work, and we commend them for finding new and innovative ways to cover the news.”
Takalani Netshitenzhe, Chief Officer for Corporate Affairs at the Vodacom Group, says: “Vodacom is proud of its 17-year association with these prestigious awards, which make an important contribution to our society through the recognition of journalistic excellence. I’d like to congratulate all of tonight’s winners and, as always, I’d like to pay tribute to our hardworking judges. Ryland Fisher, Mathatha Tsedu, Arthur Goldstuck, Collin Nxumalo, Elna Rossouw, Patricia McCracken, Megan Rusi, Mary Papayya, Albe Grobbelaar and Obed Zilwa: thank you for making these awards a continued success.”
Veteran journalist and media stalwart Ms Amina Frense is the winner of the 2018 Vodacom Journalist of the Year Lifetime Achiever Award. She has spent decades in mainstream media both locally and internationally. She is a former Managing Editor: News and Current Affairs at the SA Broadcasting Corporation. She has worked in many countries abroad as a producer and a foreign correspondent, has written two books and is also a founding member of SANEF where she still serves as a council member (full citation below).
The overall winners share the R100 000 main prize. National winners in the various categories are as follows, with each winner taking home R10 000:
The entries in this category were of an exceptionally high standard. One entrant stood out and became the unanimous winner. This journalist showed an exceptional skill for story-telling and for finding unexpected angles and unknown facts. For his stories about Musangwe’s fight for recognition, Age cheating in SA football, and Hansie Cronje revisited, the winner is Ronald Masinda, and the team of Gift Kganyago, Nceba Ntlanganiso and Charles Lombard from eSAT TV.
Cons exploit Telegram ICO
Kaspersky Lab researchers have uncovered dozens of highly convincing fake websites claiming to be investment sites for an initial coin offering (ICO) by the Telegram messaging service. Many of these websites appear to belong to the same group. In one case alone, tens of thousands of US dollars’ worth of cryptocurrency were stolen from victims believing they were investing in ‘Grams’, Telegram’s rumoured new currency. Telegram has not officially confirmed an ICO and has warned people about fraudulent investor sites.
In late 2017, stories started to circulate that the Telegram messaging service was launching an initial coin offering (ICO) to finance a blockchain platform based on its TON (Telegram Open Network) technology. Unverified technical documentation was posted online, but there appears to have been no confirmation from Telegram itself. The resulting confusion seems to have allowed fraudsters to capitalise on investor interest by creating fake sites and stealing vast sums of money.
Kaspersky Lab researchers have discovered dozens of such sites, possibly belonging to the same group, claiming to sell tokens for ‘Grams’ and inviting investors to pay with cryptocurrencies including Bitcoin, Ethereum, lice litecoin, dash and Bitcoin dash. A record of transactions on one site revealed that the scammers were able to steal at least $35,000 US dollars’ worth of Ethereum from investors.
The researchers found that some of the websites were so convincing that even after Telegram and others began to issue warnings, they were still able to recruit potential investors. Most use a secure connection, require registration and generate a unique online wallet for each new victim, making it harder to track the money.
Judging by the content of the fake websites, it appears they may have common ownership. For example, several have the exactly the same ‘Our Team’ section.
“ICOs are a fairly risky investment and many people don’t yet fully understand how they work, so it is not surprising that high quality fake websites, with seemingly reassuring features such as a secure connection and registration are successful at luring people in. People wishing to invest in an ICO would do well to check with the company behind it and make sure they know exactly who they are giving their money to, or they may never see it again,” said Nadezhda Demidova, Lead Web-Content Analyst, Kaspersky Lab.
Kaspersky Lab offers the following advice for users considering investing in an ICO:
- Check for warning signs: for example, some of the fake Telegram ICO websites had the same wrong image next to the name of Telegram’s Chief Product Officer.
- Do your homework: always check with the brand’s official site to verify the legitimacy of the investment site and, if necessary contact the company’s ICO teams before investing any money or currency.
- Use reliable security solutions such as Kaspersky Internet Security and Kaspersky Internet Security for Android, which will warn you if you try to visit fake internet pages.