Security Researchers Explore the Differences Between Tor2Mine, the Monero Mining Trojan

2021-12-5 22:01
share to
Scan QR code with WeChat

Earlier this week, security analysts at antivirus firm Sophos warned that Tor2Mine, an update to the Monero mining malware that uses the Tor portal to communicate with affected servers, would recur. In fact, you can use the entire network of operating systems. This type of cyber crime called Cryptojacking Mining and Tor2Mine works as follows. It also lists the Windows credentials that Tor2Mine uses to extend and replicate to other systems on disruptive networks. If it is not completely removed, the other machine will not be protected. Sophos noted that there was a wave of the Tor2Mine virus in early 2021, but the virus count has also declined with the introduction of new mutations. This may be due to the subtle actions of different staff members or the same participants in the situation. The company also said that although people have seen two different versions of Tor2Mine since June, "simple game plans are almost always available." The only way to prevent such mining malware is to install commercial anti-malware products that can detect it. (AMBC encryption)

Next:
Russia, Ukraine shut down several cryptocurrency mines
On December 5, it was reported that Russian and Ukrainian authorities had shut down the illegal cryptocurrency mining facility used by the stolen electricity. The following farms have been found around Kiev and Moscow, in the Russian Republic of Dagestan. (News.Bitcoin)
2021-12-5 21:46