Android Monero-Mining Malware Can Cause Device Failure
A new type of Android malware that infects devices and untetheredly mines Monero in the phone's background until the battery is exhausted or the device gives out, Called HiddenMiner.
This malware has been spotted inside apps distributed via third-party stores. Researchers say that most of the infected users are based either in China or India.
Experts say they've tracked the malware's operations back to a mining pool where crooks made 26 XMR (around $5,400).
HiddenMiner needs access to an administrator account
HiddenMiner is not the first untethered Monero-mining malware that affects Android devices. The first was Loapi, spotted last December.
HiddenMiner took inspiration from Loapi because just like the aforementioned, HiddenMiner works by tricking users into giving it access to an administrator account.
The malware then uses this account to hide the original app behind transparent app icon, and immediately start a Monero miner that runs at all times in the phone's background.
"There is no switch, controller or optimizer in HiddenMiner’s code, which means it will continuously mine Monero until the device’s resources are exhausted. Given HiddenMiner’s nature, it could cause the affected device to overheat and potentially fail".
HiddenMiner can also lock users screens
But this isn't HiddenMiner's only malicious feature. The trojan also locks the user's device whenever it detects an attempt to remote its administrator account on Android 6.0 devices and earlier. This behavior has been seen before in the LokiBot Android banking trojan.
Unfortunately, only by removing the admin account, a user will be able to remove the trojan from his device before the battery overheats and gives out, potentially destroying the rest of the device.
The only way to remove the administrator account is to reboot the device in Safe Mode and uninstall the rogue admin account, along with the HiddenMiner-infected app from there.
Currently, crooks are using a fake Google Play Store updater app (com.android.sesupdate) to distribute HiddenMiner via third-party app stores, but experts expect crooks to diversify their portfolio and even start infecting users in other areas of the globe.
Common tips to Catch Fake Android App
[ssticklist]
-
Look at the publish date.A fake app will have a recent published date.
-
Do a little research about the developer of the app you plan to install.
-
Very important – read all app permissions carefully.
[/ssticklist]
Comment(s)
Categories
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
ransomware
ransomeware
android malware
financial security
cyber security
malware
phishing attack
cyber threats
data stealing
phishing attacks
cyber threat
lockbit
india
data theft
ddos
financial fraud
cybercrime
cert-in
twitter
network security
phishing email
microsoft
critical vulnerability
trojan
cryptojacking
scam
phishing scam
play store
clop
email security
email phishing
vulnerability
cyber fraud
net protector total security
server security
malicious apps
winrar
data security
microsoft team
android apps
pakistan-backed hacker
cyberattack
cybercriminals
data backup
cyber attacks
organisation
ddos attack