Guarding Againnst Stealthy Cryptocurrency Miners: Safe Torrenting Tips for 'Spider-Man: No Way Home' With Advice by ZDNet Experts
Guarding Againnst Stealthy Cryptocurrency Miners: Safe Torrenting Tips for ‘Spider-Man: No Way Home’ With Advice by ZDNet Experts
Cybersecurity firm ReasonLabs is warning eager fans of “Spider-Man: No Way Home” to beware of cryptominers if they decide to torrent the film instead of heading to theaters for it.
In a new report, the ReasonLabs research team says it found Monero miners attached to Russian torrent files of the new film, which brought in more than $750 million worldwide since it debuted last week.
The miner adds exclusions to Windows Defender, creates persistence, and spawns a watchdog process to maintain its activity, according to ReasonLabs.
“The malware is not signed and written in .net, and as of this date, it is not present in Virus Total. The malware tries to stay away from examining eyes, by using ‘legitimate’ names for the files and processes that it creates. We recommend taking extra caution when downloading content of any kind from non-official sources – whether it’s a document in an email from an unknown sender, a cracked program from a fishy download portal, or a file from a torrent download,” the team explained.
“One easy precaution you can take is to always check that the file extension matches the file you are expecting e.g. in this case, a movie file should end with ‘.mp4’, not ‘.exe’. Try to gather information about the file, and always think twice before double-clicking on it. To make sure you see the real file extension, open a folder, go to ‘View’ and check ‘File name extensions.’ This will make sure you see the full file type.”
The researchers added that although the malware does not compromise personal information, cryptominers cause other kinds of damage.
The added electricity will cost victims of the malware and the researchers noted that the miner runs for long periods, slowing down your device while requiring high CPU usage.
When asked how they discovered the cryptominer, the ReasonLabs team told ZDNet that they have amassed a large malware database over the years that allows them to research their origins, flag them, and cross check with other databases such as Virus Total .
One of their users downloaded this “Spider-Man: No Way Home” file and it got flagged within their database as a new threat.
They do not know how many times the file has been downloaded but noted that it has been around for some time.
“The Spiderman malware is actually a new ‘edition’ of a previously known malware that was disguised as various popular apps in the past such as ‘windows updater,’ ‘discord app,’ and now the Spiderman movie. This suggests that it’s been downloaded a lot. No one else has identified this ‘edition’ of the malware,” the team said.
BreachQuest CTO Jake Williams said threat actors have used torrents as a distribution mechanism for malware long before cryptominers were a thing.
“I remember seeing a wave of threat actors compromising victims with screen savers celebrating Whitney Houston’s career in the wake of her passing. Given that cryptominers are the easiest way for threat actors to cash out, it’s not surprising that threat actors will use these as their malware payload of choice,” Williams explained.
Digital Shadows’ Sean Nikkel noted that there are likely lots of Gen Xers and Millennials who remember the days of downloading random files from strangers across Kazaa and Limewire in search of rare or free MP3 or video files and ending up with a Trojan or similar nastiness.
The tactic, he said, carried into the torrent world. In addition to malware being attached to popular movies or shows, this same thing occurs with popular applications like those from Adobe, Microsoft, or specialized music programs like Ableton or Fruity Loops, which are themselves often pirated.
“Sometimes the key generators themselves were malicious or the application’s executable. There have been plenty of office workers looking to cut corners or use programs they’re familiar with on their work computer. These users run the risk of downloading ‘free’ versions or versions hosted on bad sites and end up getting burned,” Nikkel said.
Bugcrowd CTO Casey Ellis explained that from the threat actor’s perspective, using a delivery system where users are less likely to reach out for “technical support” if something seems off or even admit to peers or family that their computer might be acting strange, gives them an increased chance of their malware executing in the first and, once it does, a lower risk of it being discovered and removed.
ReasonLabs said it is still researching the origins of the miner but noted that they are constantly seeing miners deployed as common programs, files of interest, popular apps, current events, etc.
“Miners got very popular in the past years because it’s easy money and attackers are trying to gain as many victims as possible – by any way possible, including fooling users to download files that are not what they seem,” ReasonLabs told ZDNet.
Security
The best VPN services of 2024: Expert tested
How to turn on Private DNS Mode on Android (and why you should)
The best antivirus software and apps you can buy
The best VPN routers you can buy
How to find and remove spyware from your phone
- The best VPN services of 2024: Expert tested
- How to turn on Private DNS Mode on Android (and why you should)
- The best antivirus software and apps you can buy
- The best VPN routers you can buy
- How to find and remove spyware from your phone
Also read:
- 2024 Approved Learning to Capture Virtual Conferences Without Costs
- Boosting Employer Appeal with Low-Code Solutions: Insights From ZDNet
- CEO Flips Out Over Team Usage on Microsoft Teams - Office Chaos Unleashed
- Crowned Titles Top Sierra DVD Creation Software
- Hassle-Free Ways to Remove FRP Lock on Honor 100 Prowith/without a PC
- How Does the Conflict Between Russia and Ukraine Endanger Information Technology in Ukraine? Insights & Predictions.
- How Snowflake's Latest Language Model Outshines Meta's LLaMA 지침 - Less Training, Greater Efficiency | ZDNET
- In 2024, 5 Hassle-Free Solutions to Fake Location on Find My Friends Of Motorola Moto G Stylus (2023) | Dr.fone
- In 2024, Polishing Screens Incorporating Filters in Video
- Innovating Communication Technology: Sony Research Joins Forces with AI Singapore for Advanced Large Language Model Development | ZDNET Insights
- Mastering Tech: Essential Reviews and Tips by Tom's Hardware
- Overcoming the 3-0X0001000B Hurdle in Rainbow Six Siege - Proven Solutions Inside!
- Quick Liftoff: Soaring Over Japanese Numbers
- Revolutionizing Communication with Vivaldi - Introducing a Superior Mail Client Experience | Digital Trends
- Section 2A: Understanding Grounding in Antenna Systems
- Section 3C: Five Q&As on Antenna Radiation Patterns and Design Principles
- Securing Your Microsoft Account: Essential Steps to Protect Against Cyber Threats - Tips From ZDNet
- The Hacker’s Handbook Navigating Anonymous Instagram Streaming for 2024
- Transformez ce qui vous plombe en trésor | Free Book
- Title: Guarding Againnst Stealthy Cryptocurrency Miners: Safe Torrenting Tips for 'Spider-Man: No Way Home' With Advice by ZDNet Experts
- Author: Matthew
- Created at : 2024-11-08 09:37:41
- Updated at : 2024-11-14 07:40:01
- Link: https://app-tips.techidaily.com/guarding-againnst-stealthy-cryptocurrency-miners-safe-torrenting-tips-for-spider-man-no-way-home-with-advice-by-zdnet-experts/
- License: This work is licensed under CC BY-NC-SA 4.0.