An elaborate scheme to illegally mine Monero hidden within Kobe Bryant image has been successfully blocked by Microsoft.
Earlier, there were reports that cybercriminals had devised an elaborate trick to illegally mine Monero, a cryptocurrency, by hiding a mining code inside Kobe’s photo.
Kobe died earlier this week in a tragic helicopter accident and was among the nine people who perished in the early morning crash.
Before his death, the basketball legend was highly regarded in the sporting circles and had initiated several community programs to empower local children and to promote the sport in the United States.
Given his popularity, his death came as a shocker and his family were condoled by global leaders including President Donald Trump, Barack Obama, influencers in the sporting community, and leading celebrities.
With the attention, Windows noted that cybercriminals had hatched a plan and embed a mining code within Kobe’s image.
“While the world mourns the loss of an NBA legend, cybercriminals are, as expected, taking advantage of the tragedy. We found a malicious HTML file posing as a Kobe Bryant wallpaper that contains a coin mining script.”
Upon activation, the code will execute and begin using the individual’s computing power to illegally mine XMR, the native currency of the privacy-focused blockchain.
The practice is called steganography, and the process of illegally mining crypto currencies through a self-executing code is Crypto Jacking.
Criminals prefer to embed such codes in pictures of leading celebrities considering how viral they can become. The higher the chances of being shared widely, the more they are clickable and hence mine more coins before spreading to different systems.
To protect users, Microsoft updated the community saying they had blocked the hosting website:
“Microsoft Defender SmartScreen blocks the website hosting the coin miner. Microsoft Defender ATP detects the malicious HTML file as Trojan.”
In August 2019, the French cyber unit wing, cyber gendarmes, deactivated a crypto-jacking bot, that had allegedly infected over 850k servers.
Its head, as BBC reported, was in France and was first identified by Avast, an anti-virus firm.
Jean-Dominique Nollet, the head of the Center for Combating Digital Crime (C3N), said:
“Basically, we managed to detect where was the command server, the control tower of the network of infected computers, the “botnet.” It was copied, replicated with a server of ours, and made to do things that allow the virus to be idle on the victims’ computers.”
The Bitcoin price has hit a new all-time high, after staging a monstrous rally since…
Bitcoin (BTC) is in profit on almost all of its supply, leading to discussion by…
Pro-crypto Mike Selig is reportedly the frontrunner to become the next chair of the U.S.…
Nate Geraci, president of Novadius Wealth Management, has predicted that several crypto ETF filings could…
Bitcoin-backed stocks of Strategy can now be accessed on Robinhood. This represents a significant move…
The Bitcoin ETFs have seen a huge turnaround this week, recording their largest weekly inflows…