TrustWave Finds Coinhive Monero Mining Malware Hijacking 200,000 MicroTik Routers in Brazil


200,000 Investors Become Victims of Massive Malware Attack in Brazil

Malicious software was found on a group of Monero mining systems on August 3rd. The systems, located in Brazil, and their threatening software were found by Simon Kenin, who is a TrustWave Researcher. He noticed that MicroTik was being used for the attack, impacting 200,000 routers that were in service mining Monero.

These cyber delinquents developed a program that runs in the background, while infiltrating the entire system with a malware code. The most powerful attack against a Monero system is through its CPUs and a certain mining script called a coinhive. The script runs globally, which makes it even easier to hack.

According to Forbes, the router holds a microchip, which has a great similarity to the ones that handheld devices use. Even though the microchip is not exactly well-protected or powerful, it is able to do more than just connect to the internet. In general, the accounts of users are still relatively safe with mining malware, since the attackers are not looking to steal a user’s assets. Instead, it does not a lot of damage to the infiltrated devices and can cause slow performance speeds.

The company actually already setup a patch for their threat in April, which was setup by the creator of the routers. Unfortunately, many of the owners of these routers either did not install the update or were not told about it.

Kenin said, after the analysis, “Let me emphasize how bad this attack is, there are hundreds of thousands of these devices around the globe, in use by ISPs and different organizations and businesses, each device serves at least tens, if not hundreds, of users daily.”

He continues to discuss the trend of mining, which is now including scripts like that of coinhive with Monero.

To add to this sentiment, Kenin said, “Miners, on the other hand, can be a lot more stealthy, so while a single computer would yield more money from ransomware if the user ends up paying, an attacker would prefer to run a stealthy miner for a longer period of time. The plan being that at some point the mining would be as profitable as, if not more than, the one-time ransom payout.”

Get Daily Headlines

Enter Best Email to Get Trending Crypto News & Bitcoin Market Updates

What to Know More?

Join Our Telegram Group to Receive Live Updates on The Latest Blockchain & Crypto News From Your Favorite Projects

Join Our Telegram

Stay Up to Date!

Join us on Twitter to Get The Latest Trading Signals, Blockchain News, and Daily Communication with Crypto Users!

Join Our Twitter

Add comment

E-mail is already registered on the site. Please use the Login form or enter another.

You entered an incorrect username or password

Sorry, you must be logged in to post a comment.
Bitcoin Exchange Guide