• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 28th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Android

Three Monero Mining Malware Apps Found on Play Store

October 31st, 2017 Waqas Security, Android, Malware 0 comments
Three Monero Mining Malware Apps Found on Play Store
Share on FacebookShare on Twitter

Hackers, website owners or even cybercriminals are finding new ways to use cryptocurrency miners to make easy money by using CPU of unsuspecting users. Last week, it was reported that two cryptocurrency mining malware apps were targeting Android users and now, for the second time in a week researchers have discovered three more malware-infected apps on Google Play Store targeting users to generate Monero coins.

A cryptocurrency miner works in such a way that it uses CPU power of a user’s device while they are visiting a website that is using the mining code, for example, The Pirate Bay and ShowTime’s websites. If the user is on a smartphone, they are targeted by malware-infected apps carrying cryptocurrency mining code which uses their phone’s power to generate digital coins. 

The IT security researchers at TrendMicro who discovered these apps noted that “These apps used dynamic JavaScript loading and native code injection to avoid detection.”

One app called Recitiamo Santo Rosario claimed to provide religious content (Catholic), the other one claimed to provide Internet and WiFi safety while the third one was related to car wallpapers. But in reality, all three infected users devices to generate Monero coin.

Three Monero Mining Malware Apps Found on Play Store

Malware infected apps

 The mining code in these apps was provided by CoinHive, a firm that offers cryptocurrency miner written in Javascript, which sends any coins mined by a browser to the owner of the website.

“These threats highlight how even mobile devices can be used for cryptocurrency mining activities, even if, in practice, the effort results in an insignificant amount of profit,” explained Trend Micro’s threat researchers. “Users should take note of any performance degradation on their devices after installing an app.”

Although at the time of publishing this article, Google had booted off the malware apps following TrendMicro’s report; it is quite possible that there might be other Monero mining malware apps lurking behind Google Play Store.

Remember, it all started when The Pirate Bay was caught twice using Monero mining code to generate money. Following the incident, researchers found GTA 5 gaming mod and hundreds of websites filled with a similar code targeting PC users.

Android devices which are already vulnerable to malware attacks have now another challenge to face therefore it is advised not to download unnecessary apps from a third-party website or Google Play Store and use a reliable mobile security product.

[fullsquaread][/fullsquaread]

  • Tags
  • Android
  • Cryptocurrency
  • Cyber Crime
  • Google
  • Google Play
  • internet
  • Malware
  • Monero
  • security
Facebook Twitter LinkedIn Pinterest
Previous article USB Stick with Heathrow Security and Queen' Data Found on London Street
Next article unCAPTCHA algorithm can Crack Google’s AI System reCAPTCHA
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
World's Most 'Resilient Malware' Botnet Emotet Taken Down

World's Most 'Resilient Malware' Botnet Emotet Taken Down

Top Cybersecurity Threats to Watch in 2021

Top Cybersecurity Threats to Watch in 2021

Database of 176 million Pakistani mobile phone users sold online

Database of 176 million Pakistani mobile phone users sold online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
NetWalker ransomware disrupted - Cryptocurrency and domain seized
Cyber Crime

NetWalker ransomware disrupted - Cryptocurrency and domain seized

36
Transferring Whatsapp data from iPhone to Android with MobileTrans
How To

Transferring Whatsapp data from iPhone to Android with MobileTrans

25
World's Most 'Resilient Malware' Botnet Emotet Taken Down
Cyber Crime

World's Most 'Resilient Malware' Botnet Emotet Taken Down

69

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us