Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Cloud Computing
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
Android Apps Secretly Mine Virtual Currencies

Android Apps Secretly Mine Virtual Currencies
By Seth Fitzgerald

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Users affected by this virtual currency-mining malware hiding in Android apps will find their Android phones getting warm and their battery lives massively shortened. And one mining script, CoinKrypt, might suck up your Android phone's data plan by periodically downloading what is known as a block chain, which can be several gigabytes in size.
 


Using malicious software to mine cryptocurrencies on desktop PCs is nothing new, but now mobile phones are also being infected for the same reason. Any device that has sufficient compute power is able to contribute to a mining effort and therefore, some Android apps from Google Play and third-party markets are now being used to secretly install the mining software.

Even though the process is similar on both desktop PCs and mobile devices, people with infected smartphones are tipped off because of the battery drain that inevitably occurs. Researchers at two different security firms discovered the malicious apps and determined how they work once installed. The majority of infected applications are found on third-party Web sites but two (Songs and Prized) were on Google Play and as of this morning, Songs was still available.

The mining process requires a significant amount of resources, especially for popular digital currencies like Bitcoin and Litecoin. Instead of having banks validate transactions, user compute power is employed to validate the transactions and prevent fraud. In order to make the process worthwhile, units of the currency are given to the miners, providing a way for people to make money. But this has attracted hackers who can infect other devices in order to earn more.

Battery Drain

Outside of a slow computer, there are very few ways to tell if your PC has been infected with a mining script. That is not the case with mobile devices, since battery drain will usually occur if a piece of software is using too much energy.

Marc Rogers, a security researcher with Lookout Software, helped to discover the CoinKrypt mining script for digital currencies. In a blog post, Rogers explained that during his research it became clear that a phone’s battery and data plan could be impacted while the mining script is running.

“At a minimum, users affected by this malware will find their phones getting warm and their battery life massively shortened," Rogers said. “Another added annoyance? CoinKrypt might suck up your data plan by periodically downloading what is known as a block chain . . . which can be several gigabytes in size.”

Low Return

For the most part, Rogers says that the criminals have targeted Litecoin and Dogecoin rather than Bitcoin since mining Bitcoin with any regular smartphone, tablet, or PC, is much more difficult. Still, over the course of seven days of non-stop Litecoin mining, Rogers’ team only accrued 20 cents worth of the currency in its test. This means that a hacker would have to infect thousands of devices just to earn a fair amount of money from the process.

According to security firm Trend Micro, the cybercriminals focused on Dogecoin since it is worth less than other digital currencies. “We believe that with thousands of affected devices, cybercriminals accumulated a great deal of Dogecoins," according to the firm. Clever as the attack is, whoever carried it out may not have thought things through as phones do not have sufficient performance to serve as effective miners.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Cloud Computing
1.   VMware Buys CloudVolumes' V-Apps
2.   Concerto 2200: Dedupe, Compression
3.   Office 365 Tailored for Attorneys
4.   Apple Opens China iCloud Data Center
5.   Samsung Buys SmartThings


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Mobile Technology Spotlight
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.