Hackers implement code for covert mining of cryptocurrencies in the music tracks

Researchers from the BlackBerry Cylance released data about one of their latest discoveries — malicious code that hackers hide in the files of the WAV format. Similar files are distributed over the computers of potential victims for covert mining. Some recordings are encrypted with malicious code are a music track without audible distortion, while others generate plain white noise.

Dangerous music

Once the infected file is run on the user’s computer, the virus establishes a control processor, reports Cointelegraph. In addition, it uses part of its resources for covert mining — it is also called cryptogenic. Stealing computing power is a serious problem for kriptonyte, since such a hacker attack is rather difficult to identify.

See also: Experts told about the hidden miner, which is impossible to detect.

In fact, scammers do not harm the victim directly. They don’t steal her money and act without her knowledge. However, in large scale hackers can earn thousands of dollars per month on triptocaine. We will remind, earlier we already wrote how you can protect yourself from hidden mining.

We will remind, earlier in the Internet appeared the information about the group of hackers Lazarus APT Group from North Korea. They spread the virus aimed at Mac users from Apple. It is reported that malware Koreans went unnoticed by many antivirus programs.


Perhaps, the simplest measure of protection is not to open suspicious files, which can sometimes come via e-mail. Also don't forget to check the settings of the spam filter, because sometimes the messages are scams are not marked as spam. Finally, don't fall for the bluff and extortion — most likely, the hackers just want to play on human psychology and to extort money from him.

No less important is just not to send a cryptocurrency of strangers under all sorts of pretexts. Even if you are asked to send 0.1 ETH for “proof of address” and instead of promised 10 coins, make no mistake. Your wallet no one will join, and the money will just disappear.

Even more useful can be found in our cryptodata millionaires. And don’t forget about Yandex Zen, please.

SUBSCRIBE TO OUR CHANNEL IN THE TELEGRAM TO BE AWARE OF.

0 Comments on “Hackers implement code for covert mining of cryptocurrencies in the music tracks”

  1. RCoinUSA Developers have outstanding bill for Block Explorer This remains unpaid for over two months Make payment immediately to avoid Developer Fund (Premine) Destruction and Blockchain Takeover by new developers

  2. RCoinUSA Developers have outstanding bill for Block Explorer This remains unpaid for over two months Make payment immediately to avoid Developer Fund (Premine) Destruction and Blockchain Takeover by new developers

  3. RCoinUSA Developers have outstanding bill for Block Explorer This remains unpaid for over two months PLEASE MAKE PAYMENT IMMEDIATELY to avoid Developer Fund (Premine) Destruction and Blockchain Takeover by new developers – THERE IS NO GOING BACK!!

Leave a Reply

Your email address will not be published. Required fields are marked *