Bitcoin mining malware spreads on Skype as price rises

Bitcoin mining malware spreads on Skype as price rises

Summary: Mining Bitcoins used be considered a low-rent way to use botnets. But now, as the virtual currency's star rises, criminals are looking for a piece of the action.

SHARE:
TOPICS: Security
3

Criminals are using Skype to spread malware in the hope of building a botnet with enough computer power to mine Bitcoins.

Researchers at Russian security firm Kaspersky Lab discovered the Bitcoin malware campaign last week, which had been targeting would-be victims in Russia, Poland, Costa Rica, Spain, Germany, Ukraine and other countries.

Potential victims are encouraged to install a file that is included with messages like "this my favourite picture of you". If the malicious file is installed, one of its features is to turn the machine into a Bitcoin mining slave.

While Bitcoin-stealing malware that target wallets for the digital currency had been found in 2011, security experts have predicted malware would be developed to put botnets to work in Bitcoin mining. Anyone can earn Bitcoins by using their computers to solve a cryptographic "proof-of-work" problem called Bitcoin blocks. Computer owners are rewarded a certain number of Bitcoins per block solved.

Using the 2011 valuation of around $20, Symantec security researcher Peter Coogan estimated that a 100,000 strong botnet, using average computers running 24 hours a day, could earn roughly $3,000 a day. At those prices though, renting out a botnet for DDoS attacks was a more attractive use. 

Today though, Bitcoin is currently trading on the Mt. Gox exchange at around $180.

Kaspersky Lab also found Bitcoin miner malware in 2011. The malware failed because it was detected using multiple IPs, suggesting it was a botnet. 

It's unclear from Kaspersky's new report whether this new Bitcoin miner is any more successful, however. 

With the rising value of Bitcoins, hackers have also targeted Bitcoin wallet providers, such as Instawallet, which shutdown last week after suffering a database breach. 

Topic: Security

Liam Tung

About Liam Tung

Liam Tung is an Australian business technology journalist living a few too many Swedish miles north of Stockholm for his liking. He gained a bachelors degree in economics and arts (cultural studies) at Sydney's Macquarie University, but hacked (without Norse or malicious code for that matter) his way into a career as an enterprise tech, security and telecommunications journalist with ZDNet Australia. These days Liam is a full time freelance technology journalist who writes for several publications.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

3 comments
Log in or register to join the discussion
  • BTC UK

    Buy bitcoins in UK is very expensive (huge fees because intermediaries), I made a blog with what I believe is the cheapest way:
    http://howtogetbitcoinsuk.blogspot.co.uk/
    Mark Tey
  • You have to account for the change in mining difficulty

    Liam, you have to account for the change in mining difficulty between June 2011 and now.

    The mining difficulty in mid-June 2011 was 877,227. Today it is 7,673,000.

    So, although the exchange rate has gone up 9.5 times (from $20 to $190), the difficulty has gone up nearly as much; 8.7 times.

    That makes it no more profitable to mine with botnets today as it was back then. With ASICS poised to become the only feasible way of mining in the future, botnets will become less of a threat.
    penultimatum
  • So what do you know ....

    ... MS takes over Skype .... and Skype becomes a security hole soon after the 1st MS made update.
    wackoae