Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha
December 11, 2018
Latest Cyber News, Help & Advice

Advertisement 

×

Message

EU e-Privacy Directive

This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.

View e-Privacy Directive Documents

You have declined cookies. This decision can be reversed.

Mac devices are affected by new cryptojacking malware

Written by  May 27, 2018

Amid an accelerating popularity of cryptocurrency, millions of online users have been running the risk of being left high and dry since the cybercriminals have started unleashing a huge threat with crypto jacking.

With the notorious malware, the hackers can use the gadgets of an online user without any hindrance to mint profit from the same computing device. The entire orgy of cybercrime can take place inside the computing device without the minimum knowledge of the online users helping the hackers make money silently.

This was what the experts discovered forcing the cybersecurity men to devise an effective mechanism counter the growing threat since the online users still keep fetching profit from crypto mining.

The crime comes to the knowledge of the victim as soon as the power consumption figure touches an unusual high, the gadget of the device refuses to resume works under the weight of extra operation load.

In some cases, the phone used in it won't operate normally and till the other days, these cases were not often reported. The revelation that has stunned the cybersecurity experts surfaced in Malwarebytes which rejected the widely accepted beliefs that Mac users could thwart the deepening cyber threat.

Instead, mshelper, a malware infects the Mac devices which at a time is caught in an irreparable damage and within a few minutes, the entire set of Mac device turns too hot to function. The experts at Malwarebytes who spotted and named crypto jacking called it a sophisticated malware consisting of three main parts. One launches the malware after downloading in a file.

Advertisement 

The second one, the experts say, activates it while the third component is responsible for open sourcing Monero miner. The first one installs and strikes the entire process since the second and third components keep supporting the vital one to execute the process where the hackers can cash in on the compromised Mac devices.

The joint functioning of the three basic components helps the hackers strike profit from the devices at use by the online users without their knowledge and consent. Cybersecurity experts have yet to jump into a common conclusion on the installation of the malware in question in a Mac computing machine even after the revelation of the role of a doubtful Abode flash player.

Until and unless an effective b mechanism is put in place the threat will never die down for the online users with a huge threat in store.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Top News

Error: No articles to display

Advertisement 

  1. Popular
  2. Trending
  3. Comments

Calendar

« December 2018 »
Mon Tue Wed Thu Fri Sat Sun
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31            

Advertisement 

Advertisement