Loapi cryptocurrency-mining malware physically cracks phones

Loapi cryptocurrency-mining malware physically breaks phones

Called Loapi, the malware wasgoed installed via fake adds on malicious Android apps

Cyber security researchers have discovered a lump of cryptocurrency-mining malware so strong that it can cause physical harm to the infected smartphone.

Known spil Loapi, the malware wasgoed discovered hiding ter applications for the Android smartphone operating system — yet another way hackers exploit Android’s OS.

Hijacking the infected device’s processor, the malware uses its power to perform tasks, which includes mining cryptocurrencies like bitcoin. Mining bitcoin is performed after confirming currency transactions that toebijten by completing complicated mathematical equations — this generates fresh blocks of currency.

With bitcoin’s value soaring from $1,000 at the begin of 2018 to overheen $15,000 te December, cybercriminals are keen to install mining malware on spil many devices spil possible. Fresh bitcoins which can be exchanged for US dollars or any other traditional currencies.

Discovered by researchers at Kaspersky Laboratorium, the Loapi malware places such high requests on the infected device that after just two days a test device used by Kaspersky broke chic due to an expanding battery.

Photos show up to voorstelling a phone cracked open by a bulbous batteryKaspersky Laboratorium

“Because of the onveranderlijk flow caused by the mining module and generated traffic, the battery bulged and deformed the phone voorkant,” the researchers said te a blog postbode.

Described spil a “jack of all trades”, the malware wasgoed also found to “subscribe victims to paid services, send text messages to any number, generate traffic and make money from showcasing advertisements, use the computing power of a device to mine cryptocurrencies, spil well spil perform a diversity of deeds on the internet on behalf of the user/device.”

The Kaspersky team added: “The only thing missing is user espionage, but the modular architecture of this Trojan means it’s possible to add this sort of functionality at any time.”

The app wasgoed installed on devices via fake advertisements placed inwards malicious Android apps, Kaspersky Laboratorium said. Many of the ads falsely promoted popular antivirus software.

Unlike Apple’s iOS, Android devices can download and install apps from third-party app stores, where security procedures and vetting against apps packed with malware are less effective than those employed by the Google Play store.

Leave a Reply

Your email address will not be published. Required fields are marked *