Android Apps Hide Crypto-Currency Mining Malware

  /     /     /  
Publicated : 22/11/2024   Category : security


Android Apps Hide Crypto-Currency Mining Malware


Apps downloaded by millions from Google Play and Spanish software forums include hidden altcoin-mining software. But criminals arent getting rich quickly.



Security researchers this week warned that malware designed to mine crypto-currencies has been hidden in apps distributed via Google Play as well as in online forums.
Malware known as KageCoin has been hidden inside two apps distributed through Google Play -- Songs and Prized -- which have collectively been downloaded more than a million times by Android users, Trend Micro mobile threat analyst Veo Zhang
said Tuesday in a blog post
. While the security firm informed Google about the apps, as of Thursday morning they were still available for download via Google Play.
The KageCoin malware was originally discovered in the wild -- not being distributed via Google Play -- in versions of some popular apps, including Football Manager Handheld and TuneIn Radio, that had been repacked to include code from
cpuminer
, which is a multi-threaded, CPU miner that runs on Android.
That previous version of KageCoin apparently earned its creators thousands of Dogecoins, Zhang said. But even with a botnet composed of thousands of infected smartphones, the criminals behind this enterprise arent getting rich quickly: 1,000 of the Dogecoins crypto-currency are worth only 60 cents. Yes, they can gain money this way, but at a glacial pace, he said.
Those economics might help explain why the version of KageCoin hidden in the Google Play apps has been updated to work with the
WafflePool mining pool
, which is designed to mine a variety of altcoins -- referring to any crypto-currency that
isnt Bitcoin
. In exchange for every altcoin they mine, however, they receive a payment, in bitcoins.
As far as malware goes, KageCoin isnt the worst parasite on the books, given that its somewhat resource-savvy. The mining only occurs when the device is charging, [so] the increased energy usage wont be noticed as much, Zhang said.
But the same cant be said for a malware family known as CoinKrypt, which has been distributed via online forums based in Spain -- although most of the infections appear to be based in France. Notably, one
sign of infection
by CoinKrypt is that it consumes a vast amount of resources. [At] a minimum, users affected by this malware will find their phones getting warm and their
battery-life massively shortened
, said Marc Rogers, principal security researcher at Lookout, in a blog post. Users mobile phone accounts, of course, may also get drained. CoinKrypt might suck up your data plan by periodically downloading what is known as a block chain, or a copy of the currency transaction history, which can be several gigabytes in size.
From a programming perspective, as with KageCoin, this malware is far from sophisticated. In this case, however, lack of complexity is part of what makes it dangerous, Rogers said. Unlike purpose-built crypto-currency-mining software, the malware includes no throttle to protect the software from overtaxing processors or to manage battery life, and it will continue running until the device loses power, as well as potentially damage hardware by causing it to overheat and even burn out.
CoinKrypt, like KageCoin, doesnt mine for bitcoins, which are worth about $525 each. Instead, it tries to mine Casinocoin, Dogecoin, and Litecoin. (As of Thursday, Litecoin is worth less than $15.)
Why dont smartphone malware authors try to mine bitcoins directly? The answer has to do with the complex calculations that are required to mine crypto-currencies.
To control the rate at which new digital coins are minted, the software that runs the currency sets a difficulty rate which governs just how much processing power you need to expend in order to solve the blockchain and get new coins, Rogers said. The difficulty for Bitcoin is so tough right now that a recent mining experiment using 600 quadcore servers was only able to generate 0.4 bitcoins.
That referred to an experiment conducted by iDrive, which explored whether its idle quad-core servers might provide a secondary income stream by mining bitcoins. But the findings werent good. Its a waste of time, so any other company thinking about mining with their infrastructure, learn from us, iDrives Matthew Harvey
told Data Center Knowledge
. Dont do it. You need custom machines to effectively mine bitcoins and generate a real ROI.
But might a botnet composed of Android smartphones and tablets successfully mine altcoins? According to Lookout, based on current difficulty rates, its 1 million times easier to mine Litecoin than Bitcoin, and more than 3.5 million times easier to mine Dogecoin than Bitcoin.
Based on the companys tests, however, todays smartphones simply arent powerful enough to mine altcoins, either. Notably, running AndLTC mining software on a Nexus 4, researchers found that they could achieve about 8,000 hash calculations per second. But based on the difficulty level set for Litecoin (LTC), that capability would net us 0.01 LTC after seven days non-stop mining, Rogers said. At todays exchange rates, that haul wouldnt even be worth 20 cents.
IT is turbocharging BYOD, but mobile security practices lag behind the growing risk. Also in the
Mobile Security
issue of InformationWeek: These seven factors are shaping the future of identity as we transition to a digital world. (Free registration required.)

Last News

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Android Apps Hide Crypto-Currency Mining Malware