Site icon TechGit

Chrome Malware Alert: Malicious Digmine cryptocurrency – mining code spreading via Facebook Messenger


Petya ransomware attack

With Cryptocurrency value on the rise, several cyber criminals have devised methods to dupe unwitting internet users and now, hackers have reportedly infected Facebook Messenger with malicious code for remote cryptocurrency mining.

Trend Micro’s intelligence team has discovered a nefarious cryptocurrency-mining bot dubbed as Digmine, which is spreading through Facebook Messenger. First discovered in South Korea, it is steadily spreading across the world, which includes Vietnam, Azerbaijan, Ukraine, Vietnam, Philippines, Thailand, and Venezuela.

As per the report, though it works across different platforms, Digmine only affects desktop/web browser (Chrome) version. Thank fully, if the file is opened on other platforms (e.g., mobile), the malware will not work as intended.

How Digmine infect computers?

Digmine malware is sent to victims posing as a harmless video file, but in reality, it is an AutoIt executable script.

If the user’s Facebook account is set to log in automatically, Digmine will manipulate Facebook Messenger in order to send a link to the file to the account’s friends and spread, Trend Micro claims.

As of now, the abuse of Facebook’s auto login feature on Chrome browser is limited to propagation of Digmine for now, but it won’t be a surprise if the cyber criminals highjack the whole social media account in near future.

Digmine is capable of getting updated with newer codes, as it can access from remote command-and-control (C&C) server.

Digmine, attack, chain, cryptocurrency, mining, monero

Chrome Malware Alert: Facebook Messenger infected with malicious Digmine cryptocurrency-mining code

A known modus operandi of Digmine is to spread to as many systems as possible and with increased hash rate, more income they get.

[Note: Hash rate is the speed at which a computer is completing an operation in the Bitcoin code. A higher hash rate is better when mining as it increases your opportunity of finding the next block and receiving the reward.]

Hackers are particularly mining Monero, alternate Bitcoins digital currency, which once gained, is said to be secure, private and untraceable.

Monero is a Proof of Work cryptocurrency that can be mined with computational power from a CPU or GPU. As per Cryptocompare, mining metrics are calculated based on a network hash rate of 496 MH/s and using a XMR – USD exchange rate of 1 XMR = $ 341.06. These figures vary based on the total network hash rate and on the XMR to USD conversion rate. Block reward is fixed at 5.77378715772 XMR.

Indicators of Digmine malware Compromise (IoCs):

Hash detected as TROJ_DIGMINEIN.A (SHA256);

Hash detected as BREX_DIGMINEEX.A (SHA256):

Hash detected as TROJ_DIGMINE.A (SHA256):

C&C servers related to Digmine (including subdomains):

Here’s how to protect your PCs from Digmine malware and ransomware:

Original Article

FacebookTwitterTumblrRedditLinkedInHacker NewsDiggBufferGoogle ClassroomThreadsXINGShare
Exit mobile version