RATE Group | Why this Monero mining malware was a complete failure
75110
post-template-default,single,single-post,postid-75110,single-format-standard,ajax_fade,page_not_loaded,,qode_grid_1300,side_area_uncovered_from_content,footer_responsive_adv,qode-content-sidebar-responsive,qode-child-theme-ver-1.0.0,qode-theme-ver-13.3,qode-theme-bridge,wpb-js-composer js-comp-ver-7.9,vc_responsive
 

Why this Monero mining malware was a complete failure

Why this Monero mining malware was a complete failure

[ad_1]

When most people picture a cryptocurrency mining virus capable of infecting millions of Internet of Things (IoT) smart devices, they might envision that the group behind the operation must be filled with some seriously talented, albeit misguided individuals.

While that very may well be the case for most malware, one recent example, known as LiquorBot shows that sometimes more than just technological savvy is needed to craft a successful virus.

LiquorBot was first spotted in the wild by Romanian cybersecurity company BitDefender back in May 2019. Its researchers then began tracking the development of its code—including watching for feature updates and changes. The team found that the virus is a redeveloped version of a widespread earlier virus known as Mirai, but was instead written in a programming language called Golang.

Be the first to get Decrypt Members. A new type of account built on blockchain.

Although the bot isn’t particularly impressive in terms of…

[ad_2]

Source link