{"id":18488,"date":"2017-09-12T09:00:57","date_gmt":"2017-09-12T13:00:57","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=18488"},"modified":"2020-10-13T08:00:17","modified_gmt":"2020-10-13T12:00:17","slug":"hidden-miners-botnet-threat","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18488\/","title":{"rendered":"Got any hidden miners? I wouldn&#8217;t be so sure&#8230;"},"content":{"rendered":"<p>Cryptocurrency <a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/\" target=\"_blank\" rel=\"noopener nofollow\">mining<\/a> is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up \u201cmining,\u201d or adding blocks to a blockchain and getting rewarded for it with cryptocurrency. In doing so, these miners come up with more and more ingenious ways, not all of which are legal, to earn the coveted coins. And some of the more enterprising \u201cminers\u201d have no qualms about doing this at your expense.<\/p>\n<h2>Why miners need your computer<\/h2>\n<p>We have written before about <a href=\"https:\/\/www.kaspersky.com\/blog\/are-you-a-secret-cybercriminal\/2436\/\" target=\"_blank\" rel=\"noopener nofollow\">botnets<\/a> and how hackers can turn your computer into a zombie and make it a part of a botnet. A network of such zombie computers can be used for a variety of purposes, including but not limited to <a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptocurrency mining<\/a>.<\/p>\n<p>In layman\u2019s terms, your computer becomes a part of a distributed network whose computing power is used to mine a cryptocurrency that ends up in the botnet owner\u2019s pocket. Several thousand computers on a botnet can mine cryptocurrencies much more effectively than a single computer can. In the case of a mining botnet, victims also foot the electricity bill, making installing miner applications on the computers of unsuspecting users a very lucrative business for hackers.<\/p>\n<p>Note that a rank-and-file user can install a miner application intentionally, to mine cryptocurrency on their own. Distinguishing legal mining from illegal activity is the challenge. Miner applications are identical; the difference is in the covert installation and operation of illegally acting applications.<\/p>\n<h3>How a hidden miner ends up on your computer<\/h3>\n<p>In most cases, a miner ends up on a computer with the help of a purpose-built malicious application, a so-called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dropper\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">dropper<\/a> whose chief function is to secretly install another application. Droppers usually come under the guise of pirated versions of licensed products or activation key generators for them. Users look for this type of software on peer-to-peer networks and download it intentionally.<\/p>\n<p>When the downloaded file is launched, an installer is deployed on the victim\u2019s computer and in turn downloads a miner and a special tool that conceals it in the system. The application can also come complete with services that ensure its autorun and configure its settings.<\/p>\n<p>For example, such services can suspend the miner when the user starts certain popular computer games. (The miner uses the computing power of the graphics card, and therefore, the game may start lagging and arouse the user\u2019s suspicion.)<\/p>\n<p>Such services can also attempt to disable antivirus products, suspend the miner when a system monitoring tool is running, and restore the miner if the user tries to delete it.<\/p>\n<h3>Scale of the problem<\/h3>\n<p>Hackers distribute such applications as a service. They use Telegram channels devoted to online work opportunities; you might come across ads offering trial versions of such droppers for distributing a hidden miner.<\/p>\n<p>To give you an idea of the scale of this phenomenon: <a href=\"https:\/\/securelist.com\/miners-on-the-rise\/81706\/\" target=\"_blank\" rel=\"noopener\">Our experts recently detected a botnet<\/a> consisting of an estimated several thousand computers on which the Minergate miner was secretly installed. It mines not highly popular <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bitcoin\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">bitcoins<\/a> but mostly those cryptocurrencies, such as Monero (XMR) and Zcash (ZEC), that allow the concealing of transactions and wallet ownership. The most conservative estimates reckon a single mining botnet can fetch more than $30,000 per month. More than $200,000 passed through the wallet used by the botnet our experts detected.<\/p><div id=\"attachment_18490\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/09\/12034509\/170829_miners-rise-6.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-18490\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/09\/12034509\/170829_miners-rise-6-1024x346.png\" alt=\"\" width=\"1024\" height=\"346\" class=\"size-large wp-image-18490\"><\/a><p id=\"caption-attachment-18490\" class=\"wp-caption-text\">Monero wallet, used by criminals, mentioned above. Monero\u2019s current exchange rate is about $120<\/p><\/div>\n<h3>How to protect yourself against this threat<\/h3>\n<p><a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> protects you against malicious droppers by default. Just make sure that your AV application is on at all times and this malware won\u2019t stand a chance of infiltrating your computer. If for some reason you deactivate AV and run a manual scan after becoming suspicious, Kaspersky Internet Security will immediately detect this full-fledged <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Trojan<\/a> and prompt you to get rid of it.<\/p>\n<p>Unlike droppers, miners are not malicious applications, as we mentioned earlier. That\u2019s why they fall into our <em>riskware<\/em> category \u2014 software that is legitimate but can be used for malicious purposes (you can find more details on what\u2019s included in this category <a href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>). Kaspersky Internet Security does not block or remove such applications by default; a user may have installed them on purpose.<\/p>\n<p>If you prefer to err on the side of caution and are certain that you won\u2019t be using miners and other riskware, you can always open Kaspersky Internet Security\u2019s settings, find the <em>Threats and Exclusions<\/em> section, and select the check box by <em>Detect other software<\/em>. Last but not least, scan your system regularly: Your security solution will help you avoid installing and running any unwanted applications.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>Fraudsters make a fortune mining cryptocurrencies \u2014 on your computer, at your expense, and without your knowledge.<\/p>\n","protected":false},"author":2455,"featured_media":18489,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[374,392,2640,80,2641,1134,2639,2613,2614,97,422],"class_list":{"0":"post-18488","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-bitcoin","10":"tag-botnet","11":"tag-cryptocurrencies","12":"tag-fraud","13":"tag-graphics-cards","14":"tag-internet","15":"tag-mining","16":"tag-not-a-virus","17":"tag-riskware","18":"tag-security-2","19":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18488\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hidden-miners-botnet-threat\/11212\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hidden-miners-botnet-threat\/12652\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hidden-miners-botnet-threat\/11714\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hidden-miners-botnet-threat\/11282\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hidden-miners-botnet-threat\/14321\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hidden-miners-botnet-threat\/14225\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hidden-miners-botnet-threat\/18707\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hidden-miners-botnet-threat\/3741\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hidden-miners-botnet-threat\/9469\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hidden-miners-botnet-threat\/9706\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hidden-miners-botnet-threat\/7337\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hidden-miners-botnet-threat\/14570\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hidden-miners-botnet-threat\/8623\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hidden-miners-botnet-threat\/17846\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hidden-miners-botnet-threat\/17846\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hidden-miners-botnet-threat\/17833\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18488"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18488\/revisions"}],"predecessor-version":[{"id":37301,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18488\/revisions\/37301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18489"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}