NICOMINER GOES WILD, EXPLOITING MULTIPLE VULNERABILITIES TO MINE CRYPTOCURRENCY FROM SYSTEMS

Ethical Debuggers
2 min readMar 19, 2021

We all are adapting ourselves to the new normal where virtuality is the only way for authentication. But we can not ignore the fact that cryptocurrency is already known to get authentication without losing your identity. In this currency, authentication is just performed through a digital ledger and the identity of the person is kept anonymous. While some big influencers and celebrities like Elon Musk promote the use of this currency, from some past statistics, it has also been proven to be one of the best ways for the attackers to get paid for their illegal tasks.

Everyone desires to earn more than their needs. Some found long-term investments to be more useful but on the other hand some want to become a millionaire in a short time. The latter are mostly found to get indulged in illegal tasks to fulfill their desire of becoming a millionaire in a fraction of second. Our today’s malware author also has a similar story .

Nico-jiang is a software developer by profession but also writes illegal scripts in his leisure time. He is known for his batch login scripts for some famous websites, games and well known applications. But as soon as he saw a boom in cryptocurrency, he immediately shifted his interest into miner trojans , which experts from Tencent Security named as NicoMiner after his name.

According to the calculation of the wallet computing power used by the mining Trojan, the number of infections of this Trojan has doubled in the past month, and it is estimated that the number of compromised servers has reached about 3,000. Before it reaches you, let’s know about it!

To read more, click here.

--

--

Ethical Debuggers

Debuggers covering infosec news,cyber security tutorials, data breaches, malware, threat analysis, ethical hacking, bugs, vulnerabilities and much more.