Dexphot, a malware that steals digital assets, has been revealed to have widely spread and infected almost 80,000 computers all over the world. According to a publication from security analysts at Microsoft, the infestation process began in October last year and peaked in July this year.

The analysts say that Dexphot usually hides itself within actual processes run by a system, as a way to disguise its own activities which include cryptocurrency mining and stealing digital assets. If the malware is found, any attempt to remove it still causes a reinfection.

“The Dexphot attack used a variety of sophisticated methods to evade security solutions. Layers of obfuscation, encryption, and the use of randomized file names hid the installation process. Dexphot then used fileless techniques to run malicious code directly in memory, leaving only a few traces that can be used for forensics.”

Malware is one of the most popular systems used by attackers to infect an unsuspecting owner’s computer system and make several different changes. There have been several cases of not just crypto-stealing malware, but also infections remotely installed a system that is used to hijack system resources and secretly mine cryptocurrencies. These attackers make a lot of money using energy and other resources remotely exploited.

 

Image Credits: Pixabay

The post 80,000 Computers Have Been Infected With Malware That Steals Crypto appeared first on Latest Crypto News.



This content is synced from the rightful owners. Copyright on text and images belong to the original source.

--
This article was first published on: Latest Crypto News

Dexphot, a malware that steals digital assets, has been revealed to have widely spread and infected almost 80,000 computers all over the world. According to a publication from security analysts at Microsoft, the infestation process began in October last year and peaked in July this year.

The analysts say that Dexphot usually hides itself within actual processes run by a system, as a way to disguise its own activities which include cryptocurrency mining and stealing digital assets. If the malware is found, any attempt to remove it still causes a reinfection.

“The Dexphot attack used a variety of sophisticated methods to evade security solutions. Layers of obfuscation, encryption, and the use of randomized file names hid the installation process. Dexphot then used fileless techniques to run malicious code directly in memory, leaving only a few traces that can be used for forensics.”

Malware is one of the most popular systems used by attackers to infect an unsuspecting owner’s computer system and make several different changes. There have been several cases of not just crypto-stealing malware, but also infections remotely installed a system that is used to hijack system resources and secretly mine cryptocurrencies. These attackers make a lot of money using energy and other resources remotely exploited.

 

Image Credits: Pixabay

The post 80,000 Computers Have Been Infected With Malware That Steals Crypto appeared first on Latest Crypto News.



This content is synced from the rightful owners. Copyright on text and images belong to the original source.

--
This article was first published on: Latest Crypto News