The malicious software, referred to as “Nitokod,” was designed as a desktop program for Google Translate and was built by an organization located in Turkey, according to Check Point Research (CPR) on August 29. In the lack of an official desktop client for Google’s Translate services, a large number of Google users have downloaded this program on their computers. When this program is installed on a smartphone, it immediately begins setting up a sophisticated cryptocurrency mining business on that device. Following the downloading of this malicious application, the process of installing malware is initiated via the use of a scheduled task mechanism. In a later stage, this malicious software installs a complex mining rig for the Monero (XMR) cryptocurrency.
Mining software uses Proof of Work
The mining software is based on the Proof of Work (PoW) mining concept, which consumes a significant amount of electricity. As a result of this, it gives the controller of this campaign covert access to the computers that have been infected, allowing them to scam people and subsequently cause harm to the systems. According to reports, Nitrokod malware has affected machines in at least 11 countries since its distribution in 2019. CPR has also tweeted updates and warnings regarding the crypto mining effort. As per Zscaler Threatlabz, the Joker virus, another malware, infected 50 apps on the Google Play Store earlier this year in a similar approach. They were quickly deleted from Google’s app store. According to the Zscaler ThreatLabz team, the Joker, Facestealer, and Coper malware families were discovered to be propagating via applications. When the ThreatLabz team promptly informed the Google Android Security team of these newly identified hazards, the malicious applications were quickly removed from the Google Play Store. However, even though many people in crypto are anxious about reports about possible scams, a recent study has shown that cryptocurrency scam revenue fell 65% and has been decreasing.