ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for default Register for Free to get streaming real-time quotes, interactive charts, live options flow, and more.

XLMUSD Stellar Lumens

0.110954
0.003353 (3.12%)
00:18:08 - Realtime Data
Name Symbol Market Market Cap ($) Algorithm
Stellar Lumens XLMUSD Crypto 3,159,324,374 Not Mineable
  Price Change Price Change % Current Price Bid Price Offer
  0.003353 3.12% 0.110954 0.110962 0.110964
High Price Low Price Open Price Prev. Close 52 Week Range
0.111062 0.105137 0.107675 0.107601 0.075183 - 0.195300
Exchange Last Trade Size Trade Price Currency
GDAX 00:18:05 43.00 0.110954 USD
Price x Volume Volume Base Symbol Related Pairs
9,935,632.53 91,540,046.93 XLM XLMEUR XLMGBP XLMBTC

'GhostMiner' Malware Kills Other Crypto-Miners So It Can Work Alone

26/03/2018 6:06pm

ADVFN Crypto NewsWire


 


Bitcoin Global News (BGN)

March 26, 2018 -- ADVFN Crypto NewsWire -- A new mining malware, dubbed ‘GhostMiner’ by its discoverer Minerva Labs (minerva-labs.com), is the first crypto-jacking infection to ensure maximum profit by killing off its rivals. GhostMiner is also the first ‘fileless’ mining malware, running code directly from memory without leaving files on disk.

If another crypto-jacking malware is already in the system, GhostMiner will remove it so that it alone can mine Monero cryptocurrency coins. GhostMiner first searches for and kills all miners on its blacklist using the Windows End Process force command, and then removes any remaining miners by going through a list of ports associated with miners and stopping any miners it finds.

Cryptocurrency mining has become as lucrative for cybercriminals as ransomware. But, as far as we know, GhostMiner has so far earned only around 1.5 Monero worth $300; small change compared with the Jenkins miner that made $3 million in Monero earlier this year. But GhostMiner’s author may be hiding additional funds elsewhere according to Minerva Labs, “It is highly plausible that there are other addresses used in this campaign, undetectable due to Monero's anonymity features.”

GhostMiner’s author put in a lot of hours assembling its aggressive code. A fully deployed GhostMiner payload is currently undetectable by all brand name antivirus engines. It spreads by randomly probing IP addresses until it finds a target, and then gains a foothold in the new victim’s system by burying itself inside of two nested evasion scripts, then running the scripts to launch into its fileless operational mode, from which it downloads its coinmining component.

The efforts of GhostMiner's author will not go to waste. Minerva Labs is using GhostMiner’s code against it and other mining malware with a script extracted from GhostMiner that they call MinerKiller. Minerva Labs said, “It implements all the aforementioned tactics – removing known processes, tasks, and services by name and unfamiliar ones by arguments or TCP connections typical to miners.” Incident response teams can write their own scripts for removing malicious miners by downloading MinerKiller from GitHub.

 

 

By: BGN Editorial Staff



 

1 Year Stellar Lumens Chart

1 Year Stellar Lumens Chart

1 Month Stellar Lumens Chart

1 Month Stellar Lumens Chart

Your Recent History

Delayed Upgrade Clock