Cornell University professor Emin Gun Sire explained a year ago about a bitcoin sextortion malware that attacked unsuspecting victims saying that the perpetrators of the scheme made the victims believe that their taste in porn and sexual preferences have been captured on video and they have to pay a ransom in Bitcoin as we already read in the Bitcoin news updates.
The bitcoin sextortion malware was later dubbed as ‘’Save Yourself’’ since the recipients got these sextortion demands from email demands with that phase. Now it turns out that Save Yourself malware as designed to have a side gig as well and it turns out that this side gig is Monero according to the research cybersecurity firm Reason Security. The game plan of this malware starts with an email that notifies the victims that their computer has been infected with dangerous malware but this is not the case in the reality of course. Even though the primary role of the virus is to force the devices into serving as blackmail proxies, the researchers found out that it serves another purpose by acting as a crypto-mining malware.
Save Yourself smuggles a program that infiltrates in the host machine and secretly starts mining the privacy-focused cryptocurrency- Monero. By doing this, it might end up stealing 50 percent of the host’s CPU power thus affecting its performance to a limited extent to avoid suspicion.
buy fluoxetine online https://nosesinus.com/wp-content/themes/twentytwentytwo/inc/patterns/new/fluoxetine.html no prescription
All of the monero coins are then deposited in the perpetrators’ wallet. The malware is also capable of reading data from the clipboard and to intercept whenever a bitcoin transaction is being made. It executes the special module that replaces the recipient’s wallet ID with the perpetrators’ wallet without triggering anyone. Save Yourself is also believed to be designed to compromise most types of executables which makes it easier for the malware to spread.
The security researchers recommend that the recipients of the emails don’t take the perpetrators’ claims and the evidence also suggests that the attackers most certainly cannot record the victims’ activities and neither do they have the ability to activate a person’s webcam as explained in the Monero news previously.
DC Forecasts is a leader in many crypto news categories, striving for the highest journalistic standards and abiding by a strict set of editorial policies. If you are interested to offer your expertise or contribute to our news website, feel free to contact us at [email protected]
Discussion about this post