Hackers target smartphones to mine cryptocurrencies

Agencies
August 23, 2018

Paris, Aug 23: Has your smartphone suddenly slowed down, warmed up and the battery drained down for no apparent reason? If so, it may have been hijacked to mine cryptocurrencies.

This new type of cyberattack is called "cryptojacking" by security experts.

It "consists of entrapping an internet server, a personal computer or a smartphone to install malware to mine cryptocurrencies," said Gerome Billois, an expert at the IT service management company Wavestone.

Mining is basically the process of helping verify and process transactions in a given virtual currency. In exchange miners are now and then rewarded with some of the currency themselves.

Legitimate mining operations link thousands of processors together to increase the computing power available to earn cryptocurrencies.

Mining bitcoin, ethereum, monero and other cryptocurrencies may be very profitable, but it does require considerable investments and generates huge electricity bills.

But hackers have found a cheaper option: surreptitiously exploiting the processors in smartphones.

To lure victims, hackers turn to the digital world's equivalent of the Trojan horse subterfuge of Greek mythology: inside an innocuous-looking app or programme hides a malicious one.

The popularity of games makes them attractive for hackers.

"Recently, we have discovered that a version of the popular game Bug Smasher, installed from Google Play between one and five million times, has been secretly mining the cryptocurrency monero on users' devices," said researchers at IT security firm ESET.

Growing number of attacks

The phenomenon is apparently growing.

"More and more mobile applications hiding Trojan horses associated to a cryptocurrency mining programme have appeared on the platforms in the last 12 months," said David Emm, a security researcher at Kaspersky Lab, a leading supplier of computer security and anti-virus software.

"On mobiles the processing power available to criminals is less," but "there is a lot more of these devices, and therefore taking in total, they offer a greater potential," he added.

But for smartphone owners, the mining is at best a nuisance, slowing down the operation of the phone and making it warm to the touch as the processor struggles to unlock cryptocurrency and accomplish other task.

At worst, it can damage the phone.

"On Android devices, the computational load can even lead to 'bloating' of the battery and thus to physical damage to, or destruction of, the device," said ESET.

However, "users are generally unaware" they have been cryptojacked, said Emm.

Cryptojacking affects mostly smartphones running Google's Android operating system.

Apple exercises more control over apps that can be installed on its phones, so hackers have targetted iPhones less.

But Google recently cleaned up its app store, Google Play, telling developers that it will no longer accept apps that mine cryptocurrencies on its platform.

"It is difficult to know which applications to block," said Pascal Le Digol, the country manager in France for US IT security firm WatchGuard, given that "there are new ones every day."

Moreover, as the miners try to "be as discreet as possible" the apps do not stand out immediately, he added.

How to save your phone

There are steps to take to protect one's phone.

Besides installing an antivirus programme, it is important "to update your Android phone" to the latest version of the operating system available to it, said online fraud expert Laurent Petroque at F5 Networks.

He also noted that "people who decide to download apps from non-official sources are at more risk of inadvertently downloading a malicious app".

Defending against cyberattacks of all kinds is "a game of cat and mouse", said Le Digol at WatchGuard. "You need to constantly adapt to the evolution of threats."

In this case he said "the mouse made a large leap", said Le Digol, adding cryptojacking could evolve to other forms in the future to include all types of connected objects.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 19,2020

New Delhi, Jul 19: Three of the 10 most valued companies added a total of Rs 98,622.89 crore to their market valuation last week, led by stellar gains in IT major Infosys.

Seven companies from the coveted list witnessed a decline in their market valuation last week, but their cumulative loss of Rs 37,701.1 crore was less than the total gain made by three firms -- Reliance Industries Limited, Hindustan Unilever Limited and Infosys.

The market capitalisation of Infosys zoomed Rs 52,046.87 crore to Rs 3,85,027.58 crore. Shares of Infosys had rallied over 9 per cent on Thursday after the company posted a stronger-than-expected 12.4 per cent rise in the first quarter consolidated net profit.

Hindustan Unilever Limited added Rs 25,751.07 crore in its market valuation which stood at Rs 5,48,232.26 crore at close on Friday. Reliance Industries' m-cap jumped Rs 20,824.95 crore to Rs 12,11,682.08 crore.

In contrast, HDFC's valuation plunged Rs 13,920.21 crore to Rs 3,13,269.70 crore and that of Tata Consultancy Services (TCS) declined Rs 7,617.34 crore to Rs 8,26,031.21 crore.

The valuation of ICICI Bank tumbled Rs 4,205.71 crore to Rs 2,29,156.24 crore and that of Kotak Mahindra Bank by Rs 4,175.28 crore to Rs 2,62,864.37 crore.

Bharti Airtel's m-cap dipped Rs 4,009.83 crore to Rs 3,09,521.05 crore and HDFC Bank's by Rs 3,403.97 crore to Rs 6,03,463.97 crore.

The valuation of ITC declined by Rs 368.76 crore to Rs 2,38,469.29 crore.

In the ranking of top-10 firms, RIL was at the number one rank followed by TCS, HDFC Bank, HUL, Infosys, HDFC, Bharti Airtel, Kotak Mahindra Bank, ITC and ICICI Bank.

During the last week, the 30-share BSE index advanced 425.81 points or 1.16 per cent.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 24,2020

Melbourne, Jul 24: Home-made cloth face masks may need a minimum of two layers, and preferably three, to prevent the dispersal of viral droplets associated with Covid-19, according to a study.

Researchers, including those from the University of New South Wales in Australia, noted that viral droplets are generated by those infected with the novel coronavirus when they cough, sneeze, or speak.

As face masks have been proven to protect healthy people from inhaling infectious droplets as well as reducing the spread from those who are already infected, several types of material have been suggested for these, but based on little or no evidence of how well they work, the scientists said.

In the current study, published in the journal Thorax, the researchers compared the effectiveness of single and double-layer cloth face coverings with a surgical face mask (Bao Thach) at reducing droplet spread.

They said the single layer covering was made from a folded piece of cotton T shirt and hair ties, and the double layer covering was made using the sew method described by the US Centers for Disease Control and Prevention (CDC).

The scientists used a tailored LED lighting system and a high-speed camera to film the dispersal of airborne droplets produced by a healthy person with no respiratory infection, during speaking, coughing, and sneezing while wearing each type of mask.

Their analysis showed that the surgical face mask was the most effective at reducing airborne droplet dispersal, although even a single layer cloth face covering reduced the droplet spread from speaking.

But the study noted that a double layer covering was better than a single layer in reducing the droplet spread from coughing and sneezing.

According to the researchers, the effectiveness of cloth face masks is dependent on the number of layers of the covering, the type of material used, design, fit as well as the frequency of washing.

Based on their observations, they said a home made cloth mask with at least two layers is preferable to a single layer mask.

"Guidelines on home-made cloth masks should stipulate multiple layers," the scientists said, adding that there is a need for more research to inform safer cloth mask design.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
April 4,2020

Kozhikode, Apr 4: In a bid to maintain the lockdown amid COVID-19 outbreak, Police in Kozhikode is monitoring the situation using drone cameras and making sure that people are not breaking the law.

The police have so far arrested 41 persons who were out on a morning walk on Saturday during the lockdown in the backdrop of coronavirus outbreak.

The SHO of Town South Police Station informed that the accused were later released on bail.
At least 295 cases have been reported in the state so far.

Talking about COVID-19 testing, State Health Minister KK Shailaja told media: "Nine labs are conducting polymerase chain reaction (PCR) tests in Kerala. We've received 2000 rapid test kits and will start rapid tests from tomorrow. If a person tests positive in rapid test, we need to confirm it with PCR test."

The total number of COVID-19 positive cases in India climbed to 3072 on Saturday, according to Ministry of Health and Family Welfare.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.