Android Monero-Mining Malware Can Cause Device Failure
A new type of Android malware that infects devices and untetheredly mines Monero in the phone's background until the battery is exhausted or the device gives out, Called HiddenMiner.
This malware has been spotted inside apps distributed via third-party stores. Researchers say that most of the infected users are based either in China or India.
Experts say they've tracked the malware's operations back to a mining pool where crooks made 26 XMR (around $5,400).
HiddenMiner needs access to an administrator account
HiddenMiner is not the first untethered Monero-mining malware that affects Android devices. The first was Loapi, spotted last December.
HiddenMiner took inspiration from Loapi because just like the aforementioned, HiddenMiner works by tricking users into giving it access to an administrator account.
The malware then uses this account to hide the original app behind transparent app icon, and immediately start a Monero miner that runs at all times in the phone's background.
"There is no switch, controller or optimizer in HiddenMiner’s code, which means it will continuously mine Monero until the device’s resources are exhausted. Given HiddenMiner’s nature, it could cause the affected device to overheat and potentially fail".
HiddenMiner can also lock users screens
But this isn't HiddenMiner's only malicious feature. The trojan also locks the user's device whenever it detects an attempt to remote its administrator account on Android 6.0 devices and earlier. This behavior has been seen before in the LokiBot Android banking trojan.
Unfortunately, only by removing the admin account, a user will be able to remove the trojan from his device before the battery overheats and gives out, potentially destroying the rest of the device.
The only way to remove the administrator account is to reboot the device in Safe Mode and uninstall the rogue admin account, along with the HiddenMiner-infected app from there.
Currently, crooks are using a fake Google Play Store updater app (com.android.sesupdate) to distribute HiddenMiner via third-party app stores, but experts expect crooks to diversify their portfolio and even start infecting users in other areas of the globe.
Common tips to Catch Fake Android App
[ssticklist]
-
Look at the publish date.A fake app will have a recent published date.
-
Do a little research about the developer of the app you plan to install.
-
Very important – read all app permissions carefully.
[/ssticklist]
Comment(s)
Categories
- Other (42)
- Ransomware (124)
- Events and News (26)
- Features (44)
- Security (423)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Helldown Ransomware Expands to VMware and Linux: A New Threat to Critical Infrastructure
November 20, 2024
Thousands of Fake Shopping Sites Launched to Steal Credit Card Data During Black Friday
November 15, 2024
Archive
Tags
cyber attack
phishing
data breach
ransomware
ransomeware
android malware
cyber security
malware
financial security
phishing attack
data stealing
ddos
cybercrime
critical vulnerability
trojan
twitter
cyber threat
phishing email
microsoft
data theft
cert-in
lockbit
india
december cyber attacks
pakistan-backed hacker
occasion
financial fraud
cryptojacking
clop gang
clop gang extorting
data security
user data leak
android apps
phishing scam
play store
advanced malware
android
whatsapp
clop
email phishing
fedex
cyber crime
malicious apps
pakistani hackers
net protector total security
cyber attack in india
google play store
independence day
winrar
pune