An elaborate scheme to illegally mine Monero hidden within Kobe Bryant image has been successfully blocked by Microsoft.
Earlier, there were reports that cybercriminals had devised an elaborate trick to illegally mine Monero, a cryptocurrency, by hiding a mining code inside Kobe’s photo.
Kobe died earlier this week in a tragic helicopter accident and was among the nine people who perished in the early morning crash.
Before his death, the basketball legend was highly regarded in the sporting circles and had initiated several community programs to empower local children and to promote the sport in the United States.
Given his popularity, his death came as a shocker and his family were condoled by global leaders including President Donald Trump, Barack Obama, influencers in the sporting community, and leading celebrities.
With the attention, Windows noted that cybercriminals had hatched a plan and embed a mining code within Kobe’s image.
“While the world mourns the loss of an NBA legend, cybercriminals are, as expected, taking advantage of the tragedy. We found a malicious HTML file posing as a Kobe Bryant wallpaper that contains a coin mining script.”
Upon activation, the code will execute and begin using the individual’s computing power to illegally mine XMR, the native currency of the privacy-focused blockchain.
The practice is called steganography, and the process of illegally mining crypto currencies through a self-executing code is Crypto Jacking.
Criminals prefer to embed such codes in pictures of leading celebrities considering how viral they can become. The higher the chances of being shared widely, the more they are clickable and hence mine more coins before spreading to different systems.
To protect users, Microsoft updated the community saying they had blocked the hosting website:
“Microsoft Defender SmartScreen blocks the website hosting the coin miner. Microsoft Defender ATP detects the malicious HTML file as Trojan.”
In August 2019, the French cyber unit wing, cyber gendarmes, deactivated a crypto-jacking bot, that had allegedly infected over 850k servers.
Its head, as BBC reported, was in France and was first identified by Avast, an anti-virus firm.
Jean-Dominique Nollet, the head of the Center for Combating Digital Crime (C3N), said:
“Basically, we managed to detect where was the command server, the control tower of the network of infected computers, the “botnet.” It was copied, replicated with a server of ours, and made to do things that allow the virus to be idle on the victims’ computers.”
Bitcoin traders are turning their attention to this week’s Federal Open Market Committee (FOMC) meeting.…
White House crypto czar David Sacks has shown his support for Donald Trump's nomination of…
Crypto firm Ripple has revealed that it is exploring new ways to use XRP within…
Kyrgyzstan has made a significant move in the adoption of digital finance. It has now…
Ripple-backed Evernorth's XRP treasury has grown to $1 billion just days after the company announced…
In fresh developments, the United States and China’s trade teams have commenced negotiations on the…