The recent craze on the Internet for BitCoin virtual currency is not only among people who think they can make money out of nowhere, but also among the online scammers looking generally not comes relatively easy to enter. SecureList posted this on June 28, 2011.
Described as a virtual currency costs in the P2P nature of the cash BitCoin can be immediately exchanged without users requiring a payment processor or bank apex. And as privacy advocates, drug dealers, fraudsters and hackers have increased anonymity they have embraced BitCoin fast.
In particular, people who collect BitCoin create individuals with many PC video cards that support for the crop, but it is not necessary for the pirates who operate botnets already carrying the massive computing power.
Recently, June 28, 2011, security analysts from Kaspersky Lab has identified a new malware called Trojan.NSIS.Miner.a, which have proliferated in Russia cyberspace. The Trojan had dual elements - which was a legitimate bcm.exe BitCoin Miner file, and malware, which loaded "BCM" even as the end user remains in ignorance and that has been incorporated into the system registry autorun infected. Consequently, the contaminated product bitcoins PC that the owner of the Trojan collected. Certainly, the source code of the Trojan found the server address Internet Protocol, which hosted the leadership of account.
A message appeared on the user's system who say that he was told that his account has been many IP addresses using as also was suspected of being a botnet, which is why the account was temporarily blocked. But incase the user think it would be a mistake, he must contact the relevant system, added the message. Thus, even before the account holder is starting to reap the riches, the automated mechanism suspected something and as a result, his account got temporarily disabled.
Here, the owner of the Trojan horse belonged to a pool of apparent exploitation, which worked together to combine BitCoin virtual wealth that has been divided into the total amount of computing power provided each fisherman. Fortunately, the pool followed by a mineral called rule against using bots and malware by cybercriminals has disabled fast. However, even malware can emerge later to exploit systems pool may not be as advanced.
Described as a virtual currency costs in the P2P nature of the cash BitCoin can be immediately exchanged without users requiring a payment processor or bank apex. And as privacy advocates, drug dealers, fraudsters and hackers have increased anonymity they have embraced BitCoin fast.
In particular, people who collect BitCoin create individuals with many PC video cards that support for the crop, but it is not necessary for the pirates who operate botnets already carrying the massive computing power.
Recently, June 28, 2011, security analysts from Kaspersky Lab has identified a new malware called Trojan.NSIS.Miner.a, which have proliferated in Russia cyberspace. The Trojan had dual elements - which was a legitimate bcm.exe BitCoin Miner file, and malware, which loaded "BCM" even as the end user remains in ignorance and that has been incorporated into the system registry autorun infected. Consequently, the contaminated product bitcoins PC that the owner of the Trojan collected. Certainly, the source code of the Trojan found the server address Internet Protocol, which hosted the leadership of account.
A message appeared on the user's system who say that he was told that his account has been many IP addresses using as also was suspected of being a botnet, which is why the account was temporarily blocked. But incase the user think it would be a mistake, he must contact the relevant system, added the message. Thus, even before the account holder is starting to reap the riches, the automated mechanism suspected something and as a result, his account got temporarily disabled.
Here, the owner of the Trojan horse belonged to a pool of apparent exploitation, which worked together to combine BitCoin virtual wealth that has been divided into the total amount of computing power provided each fisherman. Fortunately, the pool followed by a mineral called rule against using bots and malware by cybercriminals has disabled fast. However, even malware can emerge later to exploit systems pool may not be as advanced.
0 Comments