Using YouTube for mining without consent

Eset, a security company, has discovered that the cybercriminals behind The stantinko botnet are distributing the monero cryptocurrency mining module (XMR) via Youtube.

The antivirus software provider reports that botnet operators Stantinko have expanded their criminal capabilities, from fraudulent clicks, ad injection, social media fraud and password theft to installing cryptocurrency mining malware on victims ' devices using Youtube.

The stantinko botnet has been active since at least 2012

The stantinko botnet, which has been running since at least 2012 and is mainly aimed at users from Russia, Ukraine, Belarus and Kazakhstan. Cybercriminals, according to Eset, use YouTube channels to distribute their crypto module, which mines the monero cryptocurrency on the CPU of unsuspecting victims.

This cryptocurrency-stealing malware has reportedly infected about 500 '000 devices and is similar to the recently discovered Dexphot malware discovered by Microsoft, which has already infected more than 80' 000 computers.

Malicious code steals processing resources, hijacks legitimate system processes and disguises its activities with the ultimate goal of running crypto mining on infected devices. Eset told YouTube, which reportedly responded by deleting all channels that contained traces of the Stantinko code.

In November, Monero's core development team said software available for download on Monero's official website could have been hacked to steal cryptocurrency.

The programmer under the nickname Serhack, who is the developer of the crypto-currency network, confirmed that the software distributed after hacking the server was indeed malicious: "I can confirm that the malicious binary code steals coins. About 9 hours after running the binary, one transaction emptied the wallet. I downloaded the build yesterday around 18: 00 Pacific time.»
#youtube #monero #crypto #blockchain #mining #xmr #stantinko #anewlook