Security experts warn of bitcoin mining malware

26 Apr 2014

1

Security experts have warned that Android owners who find their battery life failing could have had their phones hijacked by hackers for use in mining bitcoin, Mailonline reported.

They discovered 'rogue' apps that allowed hackers to mine for bitcoin in the background.

Although Google had already removed dozens of the apps, security firm Lookout warned there could be more out there.

According to researchers the rogue apps were available in Google's Play store - and secretly mined bitcoin in the background.

According to researchers the key signs were rapidly depleting battery and a handset that felt unusually warm.

They have also advised to ensure that the Android system setting 'Unknown sources' was unchecked to prevent installation of dropped or drive-by-download apps.

As a first line security measure users could download a mobile security app that protected against malware.

According to the firm it found a piece of mobile malware in Google Play that quietly used the processing power of the phone to create new coins.

Google removed five of these applications after Lookout alerted the company on the issue, but it was believed the apps had between 100-500 installs each at the time of removal.

The malware was similar to other mobile cryptocurrency-mining malware, but it came with some new tricks to keep it under the  radar, including only running when the display was turned off, the battery power was more than 50 per cent, with the device connected to the internet, according to Michael Bentley, head of research and response with Lookout, the mobile security company that discovered the malicious apps, SC Magazine reported.

Since Bitcoin mining required so much computing power, batteries ended up draining quickly and mobile devices tended to overheat, so the BadLepricon author implemented the aforementioned features to help prevent the malware from giving itself away.

However, mobile malware, in the final analysis was not the best way to go when it came to mining Bitcoin.

Bently said it was actually very inefficient, and in order to be successful in using mobile mining malware, one needed to have a network of thousands of phones at one's disposal. 

However, the processing power on phones was increasing and the more powerful these devices got, the more people would experiment with digital coin mining on them.

Although Google had an excellent screening process, certain malicious apps still were able to make it to the Google Play store due to the  arena being new and the fact that security had not been perfected.

Business History Videos

History of hovercraft Part 3 | Industry study | Business History

History of hovercraft Part 3...

Today I shall talk a bit more about the military plans for ...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of hovercraft Part 2 | Industry study | Business History

History of hovercraft Part 2...

In this episode of our history of hovercraft, we shall exam...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Hovercraft Part 1 | Industry study | Business History

History of Hovercraft Part 1...

If you’ve been a James Bond movie fan, you may recall seein...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Trams in India | Industry study | Business History

History of Trams in India | ...

The video I am presenting to you is based on a script writt...

By Aniket Gupta | Presenter: Sheetal Gaikwad

view more
View details about the software product Informachine News Trackers