Can "PlayerUnknown's Battlegrounds" also encounter mining Trojans? 500 million computers are "mined"

Can "PlayerUnknown's Battlegrounds" also encounter mining Trojans? 500 million computers are "mined"

When it comes to Trojans, everyone thinks they are hateful and abominable. In recent years, as the market for encrypted digital currencies has grown and prices have continued to soar, mining Trojans have occurred frequently, becoming a major acne in the security of the current network environment. Hackers use various means to invade private computers and public websites, use illegal control of computer computing power to mine for themselves, and steal encrypted currencies. Last year, the incident became more and more rampant. Although it was under control in the first half of this year, some "smart" hackers are still frequently active.

Mining Trojan "Disguise Upgrade"

Hackers can always find all kinds of strange resources to make profits. In recent years, most of the websites targeted by mining Trojans are irregular websites (some websites with no advertising revenue have built-in mining Trojans that use user computing resources for mining). What is more worth mentioning is that among all types of websites, pornographic websites are the first to be hit and have become the "first choice" for criminals to carry out mining attacks.

Recently, Tencent Security released the "June Security Public Opinion Report" stating that mining Trojans and malicious attacks maintained high growth. Among them, mining Trojans disguised as "Chicken Eating" auxiliary software targeted game users, causing panic among a large number of users.

The report shows that Tencent Yujian Threat Intelligence Center monitored that the author of the "xiaoba" ransomware virus provided "Wild Action" game assistance on the website xiaobaruanjian.xyz, and hid the ransomware virus, mining Trojans, and tampering homepage Trojans in it. According to the report, there is another similar case of "tlMiner" mining Trojan. Its author implanted the "tlMiner" mining Trojan in programs such as "Chicken Eating" game plug-ins, Dolphin Accelerator (modified version), high-imitation pirated video websites (dy600.com), and Cool Art Film and Television Internet Cafe VIP, and spread his personal mining through channels such as Internet Cafe Alliance, forums, download sites, and cloud disks.

From this, it seems that the mining Trojan has once again "upgraded its disguise". When users open the above sites and plug-ins, the computer CPU usage will instantly soar to 100%, providing computing power for the website to generate revenue and becoming a miner for hackers.

In addition, hackers are good at using hot spots to implant malware. Take June as an example: after the college entrance examination, many college websites (the official websites of many key universities in Shandong, Hubei, Henan, Heilongjiang, etc. were implanted with mining Trojans) were hacked. Candidates had to contribute to the hackers when checking their test scores. According to monitoring by the 360 ​​Security Center, a Nordic tourism promotion website officially sponsored by the Swedish Tourism Board was implanted with mining code.

According to relevant media statistics: more than 30,000 websites have built-in mining codes, and about 500 million computers around the world have been hijacked for mining. Although the price of well-known virtual currencies such as Bitcoin has fallen, the mining Trojans have also experienced a trough period, but the frequency of popular malicious attacks in June has generally shown an upward trend.

Some experts pointed out that, in the final analysis, one of the main reasons for the outbreak of mining Trojans in recent years is the high cost of mining, such as the electricity of mining machines, which has also risen with the sharp rise in the price of coins in the past two years. Secondly, using plug-ins for mining is easier to operate and easier to invade, and it can also avoid the detection of security software. In order to seek greater personal gain, hackers unscrupulously put their "hands" into private computers and public websites, and they became more rampant after tasting the sweetness. However, this practice is always an illegal way. Judging from the current trend, I believe that it will be eliminated by new measures in a short time.


<<:  Nvidia's mining-related revenue dropped by about 94% in the second quarter

>>:  Canaan Creative is a world leader, but domestically produced CPUs still lag behind. What is the difference between dedicated chips and general-purpose chips?

Recommend

From palmistry, which people can grow old together in love?

Love can be everlasting, or it can be something y...

What’s the point of sticking with the cryptocurrency train?

In recent days, new investors have asked what the...

Lifeline bifurcation diagram, see if you have

In the field of physiognomy, the lifeline is the ...

Will a woman with a strong rebellious character be happy after marriage?

After getting married, many people are unable to ...

Full cheekbones indicate strong observation and high emotional intelligence

People in our country regard harmonious facial fe...

What are the facial features of jealous people?

What are the facial features of jealous people? I...

What do you miss easily?

What do you miss easily? Looking back on everyone...

How to remedy the bad luck you are born with

How to remedy the bad luck you are born with Peop...

The central bank affirms the positive role of digital currency

Sheng Songcheng, director of the Survey and Stati...

Analysis of the best moles on men and women

1. Mole on the nose In physiognomy, the tip of th...

Five moles that bring good luck to your husband: see if your wife has any

Everyone knows that there are many types of moles...

Is the fate of a man with a broom eyebrow good?

Everyone's eyebrows have their own shape. In ...

Women with these 9 types of hand lines have good luck

1. If you have official seal patterns on your han...