Story image

Once legit site found to be cryptomining, 6,000 machines infected

30 Apr 2018

Check Point researchers have discovered how a previously legitimate video software download site has moved into illicit cryptomining.

Back in 2011, OSDSoft was a website that provided free video download software to thousands of users around the world. The site was registered under the name Ivan Koslov and also had Facebook, Twitter and YouTube accounts marketing its product.

“In 2014 however, OSDSoft started to appear in a more suspicious context as several adware variants and Potentially Unwanted Programs (PUPs) downloaded from it were spotted in the wild,” says Check Point.

“These adwares and PUPSs acted stealthily in order to evade regular anti-virus protections and performed environment checks to make sure they were not running on a virtual machine.”

Following the sharp rise of cyrptocurrency mining towards the end of 2017, OSDSoft began to delve some of its efforts into mining the Monero cryptocurrency - a popular mining method because of its increased anonymity and profitability of mining on regular PCs.

Check Point says that after some analysis the research team estimates that around 6,000 machines so far have been infected, earning the perpetrator behind OSDSoft around US$700 every day from this mining operation alone.

“The miners are currently distributed by websites disguised as a legitimate Adobe Flash Player update service, telling the victim that their Flash version is outdated. Clicking anywhere on the screen would result in the malicious executable being downloaded,” says Check Point.

“OSDSoft’s author does not want to waste any time in this campaign either, for while waiting for the Monerominer to download, the malignant websites additionally use the CoinHive cryptomining malware to mine through the browser and maximise his profits.”

Fake Adobe Flash Player update service that distributes the cryptominer.

What’s more, the smoke around the whole operation only increases as it is legitimate hosting and file storage services such as AWS (Amazon Web Services), Dropbox and Github, that are being used to store and distribute the malicious cryptomining samples.

Check Point says OSDSoft is a perfect case study detailing how a website started with seemingly innocent intentions can be lured ‘to the dark side’ by the attraction of high value cryptocurrencies to become a cryptomining distribution platform.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.