New Malware Allows Mining Bitcoin More Effectively on Infected Computers
Unknown developers published a report on two new malware items capable of introducing dramatic amendments into Bitcoin mining on infected computers. As opposed to their counterparts, those malware programs are made in quite an exquisite way and remain almost invisible to a victim.
Both viruses, being Jellyfish (rootkit) and Demon (keylogger) can operate without launching processes in OS core, thus giving no suspicions to their victim.
The programs use GPU rather than CPU to launch on the infected computer which conceals their operation and enhances computing power. According to the experts, this could empower hidden mining of Bitcoin on infected computers.
Linux-based Jellyfish is a concept project employing LD_PRELOAD technique by Jynx, as well as OpenCL API by Khronos. The malware currently supports AMD and NVIDIA videocards. Keylogger Demon has not been described by the developers in details as yet. They just described it as proof-of-concept as provided in a work You may enter, but cannot conceal: invisible GPU-keylogger.
Ivan Meir, Moonlabs specialist for computer security, told ForkLog: This can really change malware market and start yet another wave of criminal interest towards cryptocurrency. I have never seen anything like that on malware market, yet I’m quite sure the supply has existed on private markets for at least six months.
Subscribe to our Newsletter<
- Blockstream’s Christian Decker: It’s Really Hard to Inject Usefulness Into Proof-Of-Work
- Stepan Gershuni: You Will Be Able to Buy Something With Bitcoin, Not so Sure About Other Currencies
- Whales or Rookies: Who’s to Blame for Bitcoin Crash?
- Bitcoin Needs Catastrophe to Succeed
- Adam Back: The Question Was Whether Bitcoin Would Bootstrap
- Alex Mashinsky on DeFi: Just Circulating Everything Inside the System Is not Going to Make Bitcoin Go to 100,000
- Global Recession: What Are Risks For Bitcoin And Miners
- Is Bitcoin Safe-Haven Asset? What Experts Think