Smartphone can also be exploited by hackers to dig virtual money illegally
In recent years, experts have discovered that smart phones can also be used as an advantage to bad guys to exploit illegal virtual money.
Many people have known that bad objects take advantage of personal computers or laptops to exploit Bitcoin or other virtual currencies. But in recent times, experts have discovered that smart phones can also be used as an object to exploit the virtual money illegally.
A security researcher at ESET discovered a game on Google Play Store with a huge number of downloads, Bug Swasher, containing malicious code to exploit virtual money. This game is embedded with malicious code and when the player downloads the device, it will take control of the device, then use it to dig a coin.
Similar to the computer, when Trojan Hourse sticky smartphones - malicious code of the machine, the system must handle a lot of complicated algorithms that make the machine heat up very fast, slow processing speed and very low battery life fast. Even if being exploited to exploit virtual money for a long time, the smartphone's life expectancy will be significantly reduced.
In July, Google banned all applications related to the exploitation of electronic money on Play Store, but detecting hidden Trojan Horse inside applications is extremely difficult. Therefore, in order to protect their devices, users need to be alert, not to download applications from unclear sources and when installing, pay attention to the permissions that the application requires.
See more:
- Detecting a Chrome extension infected with malicious code, stealing the password and the user's e-wallet key
- Warning: VPNFilter malicious code attacks the router that has 'evolved', there are many extremely dangerous new features
- Many cheap Android smartphones are 'promotional' codes for users
You should read it
- Warning: new code of virtual money digging is available via Facebook Messenger
- Warning: A new code of virtual money training is spreading strongly in Vietnam
- Ham hacked the game, the boy made the computer infected with virtual money and ruined it
- VNCERT issued an emergency alert warning malicious code exploiting Coinhive virtual money
- What to do when the computer is infected with a virus that fights virtual money?
- Prosecuting two directors of virtual money bitcoin
- Warning: New variants of malicious code digging on Facebook threaten users in Vietnam
- Malicious ads dig virtual money right on the browser
- Warning: a new variant of the virus that fills virtual money via Facebook Messenger will appear every 10 minutes
- What is Bitcoin? Why is Bitcoin not 'virtual money'?
- Discovery of Trojan scattering steals virtual money through YouTube
- How to dig virtual money on iPhone with MobileMiner
Maybe you are interested
Data Protection Tips From The Experts To Perfectly Secure Your Info How to Create a Javascript Console in Sublime Text If giving two neo-magnet magnets with a pulling capacity of 300 kg rushing at each other at 320 km / h, what would the result be? The mysterious journey of Galileo Galilei's missing fingers 15 great physicists change the way we understand the world Amazing engine in the world, 9 times stronger than the Titanic engine