ESET researches have identified a new crypto-related malware focused on Windows users.
Subscribe to our Telegram channel to stay up to date on the latest crypto and blockchain news.
According to WeLiveSecurity, the new malware called KryptoCibule uses the victim’s computer to mine cryptocurrencies, to hijack crypto transactions by replacing wallet addresses, and exfiltrates cryptocurrency-related files.
The malware is reportedly written in C# and dated back to 2018. The first version of the program was mining Monero (XMR), however, the latest versions of KryptoCibule use not only XMRig, but also kawpowminer, another open source program that mines Ethereum using the GPU.
"KryptoCibule makes extensive use of the Tor network and the BitTorrent protocol in its communication infrastructure," a report says.
The researches claim that new capabilities have regularly been added to KryptoCibule over its lifetime "and it continues to be under active development."
iHodl earlier reported that a new peer-to-peer botnet that has been breaching SSH servers since January 2020 is also using the Monero cryptominer.
The FritzFrog botnet is based on a decentralized infrastructure, as it distributes control among all its nodes, which makes the malware network resilient and up-to-date.
Ophir Harpaz, a security researcher at Guardicore Labs, says the unique feature of FritzFrog is that it is a fileless botnet, as it assembles and executes payloads in-memory.
If you are looking for a crypto trading platform to trade your assets, visit Gozo.pro, a safe and reliable exchange.