HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED ABOUT A MINUTE AGO.
You are here: Home / Cloud Computing / Android Apps Mine Virtual Currency
Barium Ferrite (BaFe):
Higher Capacity, Superior Performance, Longer Archival Life
www.thefutureoftape.com
Android Apps Secretly Mine Virtual Currencies
Android Apps Secretly Mine Virtual Currencies
By Seth Fitzgerald / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
27
2014


Using malicious software to mine cryptocurrencies on desktop PCs is nothing new, but now mobile phones are also being infected for the same reason. Any device that has sufficient compute power is able to contribute to a mining effort and therefore, some Android apps from Google Play and third-party markets are now being used to secretly install the mining software.

Even though the process is similar on both desktop PCs and mobile devices, people with infected smartphones are tipped off because of the battery drain that inevitably occurs. Researchers at two different security firms discovered the malicious apps and determined how they work once installed. The majority of infected applications are found on third-party Web sites but two (Songs and Prized) were on Google Play and as of this morning, Songs was still available.

The mining process requires a significant amount of resources, especially for popular digital currencies like Bitcoin and Litecoin. Instead of having banks validate transactions, user compute power is employed to validate the transactions and prevent fraud. In order to make the process worthwhile, units of the currency are given to the miners, providing a way for people to make money. But this has attracted hackers who can infect other devices in order to earn more.

Battery Drain

Outside of a slow computer, there are very few ways to tell if your PC has been infected with a mining script. That is not the case with mobile devices, since battery drain will usually occur if a piece of software is using too much energy.

Marc Rogers, a security researcher with Lookout Software, helped to discover the CoinKrypt mining script for digital currencies. In a blog post, Rogers explained that during his research it became clear that a phone’s battery and data plan could be impacted while the mining script is running.

“At a minimum, users affected by this malware will find their phones getting warm and their battery life massively shortened," Rogers said. “Another added annoyance? CoinKrypt might suck up your data plan by periodically downloading what is known as a block chain . . . which can be several gigabytes in size.”

Low Return

For the most part, Rogers says that the criminals have targeted Litecoin and Dogecoin rather than Bitcoin since mining Bitcoin with any regular smartphone, tablet, or PC, is much more difficult. Still, over the course of seven days of non-stop Litecoin mining, Rogers’ team only accrued 20 cents worth of the currency in its test. This means that a hacker would have to infect thousands of devices just to earn a fair amount of money from the process.

According to security firm Trend Micro, the cybercriminals focused on Dogecoin since it is worth less than other digital currencies. “We believe that with thousands of affected devices, cybercriminals accumulated a great deal of Dogecoins," according to the firm. Clever as the attack is, whoever carried it out may not have thought things through as phones do not have sufficient performance to serve as effective miners.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Forrester study shows 187% ROI with Druva Endpoint Backup: In a commissioned study conducted by Forrester Consulting on behalf of Druva, Forrester found that the costs and benefits for a composite organization with 3,000 inSync users, based on customer interviews, are: 1) 187% return on investment, and 2) Total cost savings and benefits of $3.8 million. Click here to access the study now.
MORE IN CLOUD COMPUTING
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
In late breaking news on Thursday, an unnamed U.S. government official told the press that investigators have solved the vexing question of how Sony’s computer network was hacked.

ENTERPRISE HARDWARE SPOTLIGHT
Almost half of consumer, industry and life sciences manufacturers are expected to be using 3D printers within three years and now 3D printing services are aiming to help companies experiment.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.