Crypto mining malware impersonates Google translate desktop, other legitimate apps


Israeli-based cyber threat intelligence firm, Check Point Research (CPR) unmasked a malicious crypto mining malware campaign dubbed Nitrokod as the perpetrator behind the infection of thousands of machines across 11 countries in a report published on Sunday.

Crypto miner malware, also known as cryptojackers, is a type of malware that exploits the computing power of infected PCs to mine cryptocurrency.

Nitrokod has been impersonating Google Translate Desktop and other free software on websites to launch crypto miner malware and infect PCs.  When unsuspecting users search for “Google Translate Desktop download”, the malicious link to the malware-infected software appears at the top of Google Search results.

Since 2019, the malware has been operating with a multi-stage infection process, starting off by delaying contaminating the infection process until a few weeks after the users download the malicious link. They also remove traces of the original installation, keeping the malware-free from detection by anti-virus programs.

“Once the user launches the new software, an actual Google Translate application is installed,” the CPR report read. This is where victims encounter realistic-looking programs with a Chromium-based framework that directs the user from the Google Translate webpage and tricks them into downloading the fake application.

In the next stage, the malware schedules tasks to clear logs to remove related files and evidence and the next stage of the infection chain will continue after 15 days multi-stage approach helps the malware avoid being detected in a sandbox set up by security researchers.

“In addition, an updated file is dropped, which starts a series of four droppers until the actual malware is dropped,” the CPR report added.

In other words, the malware starts a Monero (XMR) crypto-mining operation whereby the malware “powermanager.exe” is stealthily dropped into the infected machines by connecting to its Command and Control server that enables cybercriminals to monetize users of  Google Translate’s desktop app.

Monero is the best-known cryptocurrency for cryptojackers and other illicit transactions. The cryptocurrency offers near anonymity for its holders.

It is easy to fall victim to crypto miner malware since they are dropped from software found on the top of Google search results for legitimized applications. If you suspect your PC is infected, details on how to recover your infected machine can be found at the end of the CPR report. 



Source link

Related articles

Newsquawk Week Forward: Nvidia earnings, FOMC Minutes, US PCE, RBNZ, Aussie CPI, OPEC JMMC

Mon: US Vacation (Memorial Day), UK Vacation (Financial institution Vacation)Tue: NBH Coverage Announcement; German GfK (Jun), French Prelim. CPI (Could), EZ Shopper Confidence (Could), US Sturdy Items (Apr), Dallas Fed (Could)Wed: RBNZ Coverage...

You will quickly have the ability to begin a Spotify Jam instantly in your automobile

No must go the aux anymore as a result of Spotify is bringing its Jam characteristic to vehicles with Android Auto and Google built-in. As revealed throughout Google I/O, Spotify Jam will probably...

Why a brand new anti-revenge porn legislation has free speech consultants alarmed 

Privateness and digital rights advocates are elevating alarms over a legislation that many would anticipate them to cheer: a federal crackdown on revenge porn and AI-generated deepfakes.  The newly signed Take It Down Act...

Is anybody watching Load development in ERCOT?

ERCOT launched an up to date load development forecast in April together with projections from Transmission Service Suppliers, and the numbers are truthfully type of wild. Curious...
spot_img

Latest articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

WP2Social Auto Publish Powered By : XYZScripts.com