Story image

Once legit site found to be cryptomining, 6,000 machines infected

30 Apr 2018

Check Point researchers have discovered how a previously legitimate video software download site has moved into illicit cryptomining.

Back in 2011, OSDSoft was a website that provided free video download software to thousands of users around the world. The site was registered under the name Ivan Koslov and also had Facebook, Twitter and YouTube accounts marketing its product.

“In 2014 however, OSDSoft started to appear in a more suspicious context as several adware variants and Potentially Unwanted Programs (PUPs) downloaded from it were spotted in the wild,” says Check Point.

“These adwares and PUPSs acted stealthily in order to evade regular anti-virus protections and performed environment checks to make sure they were not running on a virtual machine.”

Following the sharp rise of cyrptocurrency mining towards the end of 2017, OSDSoft began to delve some of its efforts into mining the Monero cryptocurrency - a popular mining method because of its increased anonymity and profitability of mining on regular PCs.

Check Point says that after some analysis the research team estimates that around 6,000 machines so far have been infected, earning the perpetrator behind OSDSoft around US$700 every day from this mining operation alone.

“The miners are currently distributed by websites disguised as a legitimate Adobe Flash Player update service, telling the victim that their Flash version is outdated. Clicking anywhere on the screen would result in the malicious executable being downloaded,” says Check Point.

“OSDSoft’s author does not want to waste any time in this campaign either, for while waiting for the Monerominer to download, the malignant websites additionally use the CoinHive cryptomining malware to mine through the browser and maximise his profits.”

Fake Adobe Flash Player update service that distributes the cryptominer.

What’s more, the smoke around the whole operation only increases as it is legitimate hosting and file storage services such as AWS (Amazon Web Services), Dropbox and Github, that are being used to store and distribute the malicious cryptomining samples.

Check Point says OSDSoft is a perfect case study detailing how a website started with seemingly innocent intentions can be lured ‘to the dark side’ by the attraction of high value cryptocurrencies to become a cryptomining distribution platform.

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.