- West Virginia corrections employees suspended after Nazi salute photo surfaces Thursday 8:02 PM
- Here are the 15 best Eddie Murphy movies available to stream Thursday 7:56 PM
- Ex-InfoWars video editor admits to making up Islamophobic stories Thursday 6:55 PM
- WhatsApp accounts deleted amid Kashmir internet blackout Thursday 6:21 PM
- Guy gets mocked for tattoo of Baby Yoda drinking White Claw Thursday 6:18 PM
- Spotify Wrapped has people asking just how much it knows about us Thursday 5:50 PM
- Instagram account allegedly asked for inappropriate photos of children Thursday 5:16 PM
- How to stream ‘Boys vs. Bears on Thursday Night Football Thursday 4:33 PM
- Woman caught her boyfriend cheating through his Fitbit Thursday 4:29 PM
- The Pete Buttigieg ‘High Hopes’ dance was designed by an intern Thursday 4:17 PM
- TikTok admits to hiding content made by fat, LGBTQ, and disabled users Thursday 3:58 PM
- ‘Merry Happy Whatever’ is an unoriginal sitcom with plenty of holiday cheer Thursday 3:55 PM
- The ‘Pod Save America’ Bros are losing it over Joe Biden’s newest ad Thursday 3:28 PM
- Van Halen had a wholesome response in defense of Billie Eilish Thursday 3:15 PM
- Influencer faces wrath of K-pop fans after her son played with penis-shaped soap Thursday 1:27 PM
Skype hack hijacks your computer, puts it to work making Bitcoin
Someone’s using a Skype vulnerability to create a Bitcoin-mining botnet.
According to a post on Securelist by Kaspersky Lab’s Dmitri Bestuzhev, a new malware attack first spotted in Venezuela is using a Skype vulnerability to take over computers.
That’s nothing new. It’s what the malware does with the infected machines that makes this campaign so interesting: it uses their processing power to generate Bitcoin, the booming virtual currency that recently hit a record high of $147.
Once relegated to the dark corners of the Internet, Bitcoin is a difficult-to-trace currency that is quickly gaining favor internationally, due in part to Cyprus’s banking emergency and its inclusion in the American financial regulatory framework. It’s valuable, if volatile.
And the creators of this malware are trying to get their hands on some of it by “[abusing] the CPU of infected machine[s] to mine Bitcoins for the criminal,” Bestuzhev explained. “(I)t turns the infected machine to a slave of the bitcoin generator.”
Bitcoin mining is the process of dedicating computer processing power to a set of instructions that slowly create new bitcoins. Some have even created special computers called mining rigs solely designed for mining—though mining technology has evolved from there, leading to the use of special microchips devoted to the process.
With a big enough botnet—a network of infected “slave” computers—a criminal could bypass all that expensive technology altogether and do the heavy lifting with other people’s CPUs.
Regardless of how you do it, it requires a lot of processing power to gain the rewards of introducing new bitcoins into the ecosystem. The difficulty of mining new bitcoins, combined with the currency’s high exchange rates, has clearly made mining something worth a malware campaign.
Curt Hopkins has over two decades of experience as a journalist, editorial strategist, and social media manager. His work has been published by Ars Technica, Reuters, Los Angeles Times, and San Francisco Chronicle. He is the also founding director of the Committee to Protect Bloggers, the first organization devoted to global free speech rights for bloggers