‘CoinKrypt’ Malware Uses Google Android Phones to Mine Virtual Currency

Hackers are no longer behind your data. Now they are interested in your phone. Yes this is increasing becoming global phenomena where hackers are developing malware to damage your phone and earn virtual currency known as bitcoin. Phone Mining is a terms use to describe the way in which hackers can use your phone to generate virtual currency.
 These malware are embedded in different android apps and are usually uploaded on Google store. A user download an app thinking of it to be game, or whatever he wants. Yet in truth it is a malware that will install it self on ur device and then use it to mine digital money. Just recently, researchers at Trend Micro noted the appearance of Google Android malware as repacked copies of popular apps such as Football Manager Handheld and TuneInvRadio that is involved in mining digital money. 
The apps were injected with the CPU mining code from a legitimate Android cryptocurrency mining app that is based on the well- known cpuminer software.

Lookout principal security researcher Marc Rogers told Security Week that software can not only use your packet data but it can also damage or burn your hardware. As it sets the infected phone to mine for currency by downloading and generating Gigabytes of hashes. 
Which will heat up your phone incredibly and will damage your phone’s battery and power supply. “Users with phones and tablets that are suddenly charging slowly, running hot, or quickly running out of batteries may want to consider if they have been exposed to this or similar threats,” blogged Trend Micro Mobile Threats Analyst Veo Zhang. “Also, just because an app has been downloaded from an app store – even Google Play – does not mean it is safe”.

Source: http://whogothack.blogspot.co.uk/2014/04/malware-uses-google-android-phones-to_11.html#.Vl4DA1UrLIU

The post ‘CoinKrypt’ Malware Uses Google Android Phones to Mine Virtual Currency appeared first on Am I Hacker Proof.

View full post on Am I Hacker Proof

. . . . . . . .

Leave a Reply