Russian malware mines bitcoins through botnet

The malware harnesses the computing power of compromised computers to earn bitcoins

A Russian porn site is delivering malware that uses the victims' computers to mine bitcoins, according to research from ThreatTrack Security.

The malware, named "Fareit," has been circulating on the Internet for at least six months and infects Windows computers. It has been modified to "mine" the virtual currency, said Dodi Glenn, manager of ThreatTrack Labs, a security company that was spun off from GFI Software last month.

Bitcoin is a virtual currency that can be transferred for free using peer-to-peer software. New bitcoins are created by mining, or contributing computing power that is used to verify transactions, which are entered into a public ledger called the blockchain.

New blocks are created about every 10 minutes, and miners who create a new block are rewarded with 25 bitcoins, the preset reward set by the Bitcoin's system's pseudonymous creator, Satoshi Nakamoto.

Fareit is general family of malware that in this case has been modified to install a bitcoin mining application called "CG Miner." A look inside the software package installed shows a script comment written in Cyrillic, according to ThreatTrack's writeup.

The hackers then use the victim's computer to compute parts of the blockchain and then send that data to Russian domains, Glenn said. "You're then part of their particular ring," he said.

This particular variant of Fareit was submitted to VirusTotal around January, but there is other malicious software engineered to mine bitcoins created as recently as three weeks ago, Glenn said.

Mining bitcoins on compromised computers is a less intrusive way of acquiring the virtual currency than stealing the coins from people's computers, Glenn said. Victims may not even notice the malware running on their computer, while those who lost bitcoins certainly would.

Fareit was planted on a Russian porn site, Glenn said. It is delivered to a vulnerable computer by the Blackhole exploit kit, which attacks a person's computer and looks for vulnerabilities upon visiting a website. Fareit is also capable of stealing information from a computer as well as conducting distributed denial-of-service attacks (DDOS), Glenn said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: ThreatTrack Security, security, Exploits / vulnerabilities, malware

Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]

Comments

Maureengoodin

1

the virtual currency than stealing the coins from people's computers, Glenn said. Victims may not even notice the malware running on their computer, while those who lost bitcoins certainly would. http://www.kamagrafx.com/

Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Management Solutions

Endpoint Security Management

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.