Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Digmine Cryptocurrency Miner Spreads via Facebook Messenger

    Written by

    Sean Michael Kerner
    Published December 27, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As the value of cryptocurrency has grown over the course of 2017, so too have the methods used by hackers to get unauthorized mining code running on end-user systems. Security firm Trend Micro last week disclosed the latest method, issuing a warning about a campaign that abuses Facebook Messenger to help deliver and control a cryptocurrency miner to victim systems.

      Trend Micro has dubbed the cryptocurrency miner campaign “Digmine,” reporting that the attack was active in several regions around the world, including South Korea, Ukraine, Philippines, Thailand and Venezuela.

      The Digmine attack uses a Facebook Messenger bot to send a message to unsuspecting users that includes a link to a cryptocurrency miner. The scope of the attack is limited in that it only works against the desktop web browser version of Facebook Messenger running in Google Chrome.

      Trend Micro reported its research to Facebook, which has already taken steps to mitigate the risk.

      “We maintain a number of automated systems to help stop harmful links and files from appearing on Facebook and in Messenger,” Facebook stated. ” If we suspect your computer is infected with malware, we will provide you with a free anti-virus scan from our trusted partners. We share tips on how to stay secure and links to these scanners on facebook.com/help.”

      How Digmine Works

      According to Trend Micro’s analysis of Digmine, the code was built using the AutoIT scripting language to help automate the delivery of the cryptocurrency miner campaign. Cryptocurrency is created, or “mined,” using computing power to discover blocks. There are many different types of cryptocurrency, with Bitcoin not only being the most well-known but also having the highest value.

      Digmine doesn’t mine Bitcoin, which typically requires GPUs or purpose-built systems. Rather, Trend Micro reported that Digmine is being used to mine the Monero cryptocurrency, which can be done with CPU-powered systems. Among the noteworthy aspects of the Digmine attack is its ability to propagate widely.

      “If the user’s Facebook account is set to log in automatically, Digmine will manipulate Facebook Messenger in order to send a link to the file to the account’s friends,” Trend Micro stated in its analysis. “The abuse of Facebook is limited to propagation for now, but it wouldn’t be implausible for attackers to hijack the Facebook account itself down the line.” 

      According to Trend Micro’s analysis, Digmine is using a variant of the XMRig open-source Monero miner as its payload to exploit systems.

      The idea of using some form of malware to get cryptocurrency mining code onto end-user system is not a new one. Several research reports in 2017 have pointed to the increasing use of software known as Coinhive, which mines Monero without user knowledge via a hidden script on a web page. Symantec reported that browser-based cryptocurrency mining has been around since 2011, though it was the launch of Coinhive in September 2017 that has led to a sharp increase in attacks.

      Attackers are also making use of known vulnerabilities to take aim at servers, in a bid to boost unauthorized cryptocurrency mining activities. Network security vendor F5 reported that the Zealot campaign is targeting servers that have not patched for the Apache Struts CVE-2017-5638 flaw that led to the Equifax data breach in order to deploy cryptocurrency mining code.

      What Should Users Do?

      There are several steps that users can take to limit the risk of unintentionally becoming a cryptocurrency mining host. Keeping all software, including operating systems, browsers and browser extensions, up-to-date is a key step.

      In addition, endpoint anti-malware security technologies can be used to help detect and block unwanted cryptocurrency mining code. At the network layer, organizations can make use of network firewalls and intrusion protection system (IPS) technologies to help block connections to mining pools.

      “All mining software, whether it is file- or browser-based, must be able to connect to either the cryptocurrency network or a mining pool to exchange data, in other words its proof-of-work,” Hon Lau, development manager at Symantec, wrote. “Without this connection, it cannot get the data it needs to generate hashes, rendering it useless.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.