HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 7 MINUTES AGO.
You are here: Home / Mobile Tech / Android Apps Mine Virtual Currency
82% of the Fortune 500
Use BMC for innovative solutions & competitive business advantage.
Contact BMC to learn more.
Android Apps Secretly Mine Virtual Currencies
Android Apps Secretly Mine Virtual Currencies
By Seth Fitzgerald / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
27
2014



Using malicious software to mine cryptocurrencies on desktop PCs is nothing new, but now mobile phones are also being infected for the same reason. Any device that has sufficient compute power is able to contribute to a mining effort and therefore, some Android apps from Google Play and third-party markets are now being used to secretly install the mining software.

Even though the process is similar on both desktop PCs and mobile devices, people with infected smartphones are tipped off because of the battery drain that inevitably occurs. Researchers at two different security firms discovered the malicious apps and determined how they work once installed. The majority of infected applications are found on third-party Web sites but two (Songs and Prized) were on Google Play and as of this morning, Songs was still available.

The mining process requires a significant amount of resources, especially for popular digital currencies like Bitcoin and Litecoin. Instead of having banks validate transactions, user compute power is employed to validate the transactions and prevent fraud. In order to make the process worthwhile, units of the currency are given to the miners, providing a way for people to make money. But this has attracted hackers who can infect other devices in order to earn more.

Battery Drain

Outside of a slow computer, there are very few ways to tell if your PC has been infected with a mining script. That is not the case with mobile devices, since battery drain will usually occur if a piece of software is using too much energy.

Marc Rogers, a security researcher with Lookout Software, helped to discover the CoinKrypt mining script for digital currencies. In a blog post, Rogers explained that during his research it became clear that a phone’s battery and data plan could be impacted while the mining script is running.

“At a minimum, users affected by this malware will find their phones getting warm and their battery life massively shortened," Rogers said. “Another added annoyance? CoinKrypt might suck up your data plan by periodically downloading what is known as a block chain . . . which can be several gigabytes in size.”

Low Return

For the most part, Rogers says that the criminals have targeted Litecoin and Dogecoin rather than Bitcoin since mining Bitcoin with any regular smartphone, tablet, or PC, is much more difficult. Still, over the course of seven days of non-stop Litecoin mining, Rogers’ team only accrued 20 cents worth of the currency in its test. This means that a hacker would have to infect thousands of devices just to earn a fair amount of money from the process.

According to security firm Trend Micro, the cybercriminals focused on Dogecoin since it is worth less than other digital currencies. “We believe that with thousands of affected devices, cybercriminals accumulated a great deal of Dogecoins," according to the firm. Clever as the attack is, whoever carried it out may not have thought things through as phones do not have sufficient performance to serve as effective miners.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.
MORE IN MOBILE TECH
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Sony is no stranger to breaches. Sony’s PlayStation Network was hacked in 2011 and attackers obtained 77 million user accounts. The latest attack comes against Sony Pictures Entertainment.

ENTERPRISE HARDWARE SPOTLIGHT
Chinese computer maker Lenovo got creative with the marketing campaign around its Yoga 3 Pro. Lenovo hired the Upright Citizens Brigade, a comic troupe, to help drum up visibility for its new device.

MOBILE TECHNOLOGY SPOTLIGHT
In its bid for the wearables market, Sony is reportedly developing a watch made out of electronic paper for release as soon as next year. The e-paper watch will emphasize style over tech innovations.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.