Cybercriminals have replaced priorities: to locks kriptomayningovy malwares, reviews, comments

Cybercriminals have replaced priorities: to locks kriptomayningovy malwares

have succeeded

the Kaspersky Lab has disclosed scales and model of work of the new malicious software called by "PowerGhost". It attacks mainly corporate networks and infects everything, from personal trackers to server complexes. But PowerGhost doesn't interest contents of memory of these systems, the malware only forces them to maynit unknown cryptocurrency, however in really titanic volumes.

In Kaspersky Lab say that the percent of the attacks for the PO installation for the hidden kriptomayning in the world has grown on 80  % since last year. If the 2017th is remembered as "year of locks", WannaCry and NotPetya, then present is characterized by splash in interest in cryptoconversion. Not confidential information, but computing power of digital devices became a subject of interest of malefactors.

Probably, it it is worth calling "cyber-parasitizing". PowerGhost doesn't close access to the system infected with him, but seeks to use a maximum of her resources in the purposes. He doesn't control operation of the personal computer, and just turns in his memory, forcing the car to carry out labor-consuming tasks and to send outside small volumes of data. It is extremely difficult to trace them in scales of corporate network, and the end user often also doesn't understand that his workstation is infected.

the Initiator of the attack doesn't get profit directly, him rates of distribution of a malware and speed of a mining don't worry, he doesn't contact to the victim, for the lack of accurate definition that in any way. The easy, safe way of a profit, new faceless threat against which it will be very difficult to fight, predict in Kaspersky Lab. But there's no evil without good – ordinary users can quietly sigh, their juicy photos and personal accounts very few people interest now.
Share on Facebook Share on Twitter Share on Google+
Comments / reviews:
Name:
E-Mail:
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent
Security: *
The Last Tuesday was difficult for the system of cyber security of Sberbank which has undergone large-scale hacker attack. According to the experts, it was undoubtedly well prepared, carefully planned action which purpose were online resources of the company. Tens of thousands of computers
According to the experts of the RiskIQ company working in the sphere of cyber security, every third of 800 piracy film websites checked by them besides movies distributes malicious applications, including, participating in theft of personal data, financial information and the allowing malefactors
The Interest of the U.S. Government in the user information continues to grow. As reports to Google, the company has received the record number of requests from the government on opening of information on users for the first half of this year. State structures of the United States continue to
in 2014 the Internet can Already disappear. At least, the expert of Kaspersky Lab Alexander Gostev holds such opinion. In the next report Gostev reports that in 2014 the Internet in global understanding can forever disappear. And he will be succeeded by "local" national networks. In other
The intensity of cyber attacks to information resources of the U.S. Government has considerably increased Recently that has given a reason to his official representatives to consider it real war. From 2009 to 2013 the number of illegal penetrations has grown from 30 to 50 thousand, that is has
intelligence agencies of the USA has been carried out by more 200  Two years ago; cyber attacks . The The Washington Post edition with reference to the reliable source familiar with a situation has the day before reported about it. It is possible that this source – Edward Snowden, whose name
with Though XRP doesn't treat hard currencies and isn't even cryptocurrency by definition, she is often compared to bitcoin and air. Because from the point of view of market capitalization of XRP third largest in the world and her use more and more people and the organizations. And in it a
Powerful, lightweight, integrated protection for PC, Mac and Android. 100% cloud-based Webroot Internet Security Plus with antivirus protects your personal information by blocking the latest malware, phishing, and cyber-attacks. We scan billions of apps, files, and websites continuously to
Powerful, lightweight, integrated protection for PC, Mac and Android. 100% cloud-based Webroot Internet Security Plus with antivirus protects your personal information by blocking the latest malware, phishing, and cyber-attacks. We scan billions of apps, files, and websites continuously to
Powerful, lightweight, integrated protection for PC, Mac and Android. 100% cloud-based Webroot Internet Security Plus with antivirus protects your personal information by blocking the latest malware, phishing, and cyber-attacks. We scan billions of apps, files, and websites continuously to