BeInNews Academy Ltd © Street: Suite 1701 – 02A, 17/F, 625 King’s Road, North Point. Hong Kong.
Microsoft issued a warning against new malware named Dexphot — a crypto mining software that has infected over 80,000 devices, according to estimates.
Once you've bought or received bitcoins; you now need to keep them as safe as possible. This guide will provide... More researchers from Microsoft issued a new warning about another crypto-mining malware known as Dexphot. While the malware was just revealed, it has actually been active for over a year, infecting computers around the world and using them and their resources for crypto mining.
Microsoft says new Dexphot malware infected more than 80,000 computers https://t.co/6LUQ4qAsIg
— ZDNet (@ZDNet) November 27, 2019
Researchers believe that the malware peaked earlier this year, in June, when it managed to infect over 80,000 devices, in total. From that point on, the number of infections started to drop due to Microsoft’s efforts.
One interesting detail about the malware is that it uses extremely complex methods to perform a relatively mundane task of mining crypto. Its purpose was not to gain attention from the media, steal data, hijack the device and demand money, or something like that. Instead, it is one of the campaigns that could become active at any time, silently infecting a device, and using its resources for crypto mining.
While there is plenty of other malware that do the same, none of them are as complex as Dexphot. It acts as a second-stage payload, which is a kind of malicious software that gets installed on the device that is already infected by some other malware.
Another interesting detail is that Dexphot uses a lifeless execution, meaning that it runs in memory only and that it is invisible to most antivirus solutions that are signature-based. It also uses a technique called LOLbins, which uses Windows processes to execute its code.
On top of that, it also uses another technique known as polymorphism, which continuously changes its artifacts. This means that its operators change URLs and file names every 20 or 30 minutes. This makes it incredibly difficult to detect any patterns and identify the threat.
Even if it was detected, it had mechanisms that would ensure its persistence by re-infecting the systems that were not completely cleaned. It uses a technique known as process hollowing, and it works as a failsafe, which allowed it to return even after it was detected and removed. Also, each time it re-infected the device, it would return modified and with updated instructions.
What do you think about this incredibly complicated malware? Do you expect malware in the future to be just as complex, or more? Let us know your thoughts in the comments below.
Images are courtesy of Shutterstock, Twitter, Pixabay.
Do you want to Be In Crypto?Join our Telegram Trading Group for FREE Trading Signals,a FREE Trading Course for Beginners and Advanced Tradersand a lot of fun! Images courtesy of Shutterstock, TradingView and Twitter.