Gamers Fall Prey to Crypto-JackingDefense & Security 

Gamers Fall Prey to Crypto-Jacking

With year-long popularity, cryptocurrency has gained the attention of governments and cybercriminals.

A new malware called Crackonosh has been encroaching on gamers’ devices, as per a report from AVAST- a cybersecurity company. Since 2018, ‘Crackonosh’ has been known to generate 2$ million worth of cryptocurrency.

It would be self-downloaded with games such as NBA 2K19, Grand Theft Auto V, Far Cry 5, The Sims 4, and Jurassic World Evolution, available to download on torrent sites.

Crakonosh uses the computer for mining without the user knowing about it. It only targeted the gamers because of the compatibility of their device with crypto mining. Gaming devices can handle heavy software and function smoothly.

What is Crypto-Jacking?

Crypto-Jacking is a cyberattack that uses other people’s devices for crypto mining. Computers, smartphones, tablets, or even servers of all kinds and devices could be compromised with crypto-jacking.

Crypto-jacking has become an increasingly popular way for fraudsters for crypto mining. It is a specific type of crime in which the attackers install the malware in other people’s devices for crypto mining. These malware work in the background. The owners are often unaware of the functioning of the device.

Hackers spread malware using several techniques such as phishing emails, infecting a website, or an online ad. Most malware is auto executing software that installs and starts running by itself.

Crypto-jacking victims depends on the niche of the cybercriminals. In the mentioned case only gamers were targeted but anyone can be on the receiving end.

What is Crypto Mining?

Cryptocurrencies use decentralized identity technology to operate. It is a public ledger that publicized the transactions made on the crypto platform while hiding the identities of the consumers. It encrypts each transaction in a set of mathematical problems.

The legitimacy of the transaction is checked by ‘crypto miners’. They also provide the power to produce new currency. They are rewarded if they do both.

How to Know if the Device is Corrupted?

Unlike any other malware, it is impossible to know if the device is crypto-jacked. There are only two real signs of malware corruption.

Slowed down device: The malware is bulky software so, when they start operating, they take up a lot of RAM, leading to the slow down of computers.

Taking up too much power: Crypto mining also makes cryptocurrency. The production of cryptocurrency needs a lot of power. Mining consumes electricity in heavy quantity. So, if the device gets heated up continuously and the electricity bills are rising tremendously, it might be a sign of the devices being hacked.

Working of Crypto-Jacking

Cracked software is one of the most common ways for attackers to spread malware, and threats like Crackonosh continue to take advantage of users’ curiosity in such dubious sources. As a result, consumers are advised to use authentic software to avoid cyber-attacks.

Some crypto mining scripts feature worming capabilities that infect other network devices and servers. It also makes them difficult to discover and delete; the crypto jacket’s only financial interest is to preserve persistence on a network.

Precautions for Crypto-Jacking

The methods for detecting and avoiding such frauds are the same as any other malware. It is necessary to avoid unknown links, emails, text messages, and other forms of communication. Many attackers also build websites that offer rewards to users with cryptocurrency for clicking a button; visitors should stay away from such schemes. Additionally, an antivirus program can assist and ensure that known crypto-jacking malware is blocked before it causes harm.

Cases of Crypto-Jacking

The malware is linked to video games several times. Recently, a hacking campaign targeted gamers through a Steam platform.

Docker Hub accquitted with malicious intent mine Monero

Palo Alto Networks discovered a crypto-jacking scheme in June 2020 that used Docker images to send crypto mining software to victims’ devices over the Docker Hub network. Using a Docker image to include the crypto mining code helps to prevent discovery. The infected photos were viewed more than two million times, and Palo Alto estimates that the crypto jackers pocketed $36,000.

GitHub assists cryptocurrency miners.

As per a report from Avast Software, GitHub hosted crypto-jacking malware for crypto-miners and gamers. They seek out legitimate projects from which they establish clones. The malware is buried and forked in the project’s directory structure. The crypto jackers use a phishing method to entice individuals to download the virus, such as a warning to upgrade their Flash player or the promise of an adult content gaming site.

Why are Crypto-Jacking Scams Risky?

Crypto jackers only use the device and the power needed to operate. They don’t steal data, spy, or indulge in any criminal activity.

These frauds can consume up to 70% of your computer’s (or mobile phone’s) resources, significantly slowing it down. It is known to cause electronics to overheat and even catch fire. While one will most likely notice the phone or laptop heating up, crypto-jacking malware can also damage IoT devices, which aren’t often monitored and can be used to track people.

With year-long popularity, cryptocurrency has gained the attention of governments and cybercriminals.

A new malware called Crackonosh has been encroaching on gamers’ devices, as per a report from AVAST- a cybersecurity company. Since 2018, ‘Crackonosh’ has been known to generate 2$ million worth of cryptocurrency.

It would be self-downloaded with games such as NBA 2K19, Grand Theft Auto V, Far Cry 5, The Sims 4, and Jurassic World Evolution, available to download on torrent sites.

Crakonosh uses the computer for mining without the user knowing about it. It only targeted the gamers because of the compatibility of their device with crypto mining. Gaming devices can handle heavy software and function smoothly.

What is Crypto-Jacking?

Crypto-Jacking is a cyberattack that uses other people’s devices for crypto mining. Computers, smartphones, tablets, or even servers of all kinds and devices could be compromised with crypto-jacking.

Crypto-jacking has become an increasingly popular way for fraudsters for crypto mining. It is a specific type of crime in which the attackers install the malware in other people’s devices for crypto mining. These malware work in the background. The owners are often unaware of the functioning of the device.

Hackers spread malware using several techniques such as phishing emails, infecting a website, or an online ad. Most malware is auto executing software that installs and starts running by itself.

Crypto-jacking victims depends on the niche of the cybercriminals. In the mentioned case only gamers were targeted but anyone can be on the receiving end.

What is Crypto Mining?

Cryptocurrencies use decentralized identity technology to operate. It is a public ledger that publicized the transactions made on the crypto platform while hiding the identities of the consumers. It encrypts each transaction in a set of mathematical problems.

The legitimacy of the transaction is checked by ‘crypto miners’. They also provide the power to produce new currency. They are rewarded if they do both.

How to Know if the Device is Corrupted?

Unlike any other malware, it is impossible to know if the device is crypto-jacked. There are only two real signs of malware corruption.

Slowed down device: The malware is bulky software so, when they start operating, they take up a lot of RAM, leading to the slow down of computers.

Taking up too much power: Crypto mining also makes cryptocurrency. The production of cryptocurrency needs a lot of power. Mining consumes electricity in heavy quantity. So, if the device gets heated up continuously and the electricity bills are rising tremendously, it might be a sign of the devices being hacked.

Working of Crypto-Jacking

Cracked software is one of the most common ways for attackers to spread malware, and threats like Crackonosh continue to take advantage of users’ curiosity in such dubious sources. As a result, consumers are advised to use authentic software to avoid cyber-attacks.

Some crypto mining scripts feature worming capabilities that infect other network devices and servers. It also makes them difficult to discover and delete; the crypto jacket’s only financial interest is to preserve persistence on a network.

Precautions for Crypto-Jacking

The methods for detecting and avoiding such frauds are the same as any other malware. It is necessary to avoid unknown links, emails, text messages, and other forms of communication. Many attackers also build websites that offer rewards to users with cryptocurrency for clicking a button; visitors should stay away from such schemes. Additionally, an antivirus program can assist and ensure that known crypto-jacking malware is blocked before it causes harm.

Cases of Crypto-Jacking

The malware is linked to video games several times. Recently, a hacking campaign targeted gamers through a Steam platform.

Docker Hub accquitted with malicious intent mine Monero

Palo Alto Networks discovered a crypto-jacking scheme in June 2020 that used Docker images to send crypto mining software to victims’ devices over the Docker Hub network. Using a Docker image to include the crypto mining code helps to prevent discovery. The infected photos were viewed more than two million times, and Palo Alto estimates that the crypto jackers pocketed $36,000.

GitHub assists cryptocurrency miners.

As per a report from Avast Software, GitHub hosted crypto-jacking malware for crypto-miners and gamers. They seek out legitimate projects from which they establish clones. The malware is buried and forked in the project’s directory structure. The crypto jackers use a phishing method to entice individuals to download the virus, such as a warning to upgrade their Flash player or the promise of an adult content gaming site.

Why are Crypto-Jacking Scams Risky?

Crypto jackers only use the device and the power needed to operate. They don’t steal data, spy, or indulge in any criminal activity.

These frauds can consume up to 70% of your computer’s (or mobile phone’s) resources, significantly slowing it down. It is known to cause electronics to overheat and even catch fire. While one will most likely notice the phone or laptop heating up, crypto-jacking malware can also damage IoT devices, which aren’t often monitored and can be used to track people.

Related posts

Leave a Comment