Story image

Once legit site found to be cryptomining, 6,000 machines infected

30 Apr 18

Check Point researchers have discovered how a previously legitimate video software download site has moved into illicit cryptomining.

Back in 2011, OSDSoft was a website that provided free video download software to thousands of users around the world. The site was registered under the name Ivan Koslov and also had Facebook, Twitter and YouTube accounts marketing its product.

“In 2014 however, OSDSoft started to appear in a more suspicious context as several adware variants and Potentially Unwanted Programs (PUPs) downloaded from it were spotted in the wild,” says Check Point.

“These adwares and PUPSs acted stealthily in order to evade regular anti-virus protections and performed environment checks to make sure they were not running on a virtual machine.”

Following the sharp rise of cyrptocurrency mining towards the end of 2017, OSDSoft began to delve some of its efforts into mining the Monero cryptocurrency - a popular mining method because of its increased anonymity and profitability of mining on regular PCs.

Check Point says that after some analysis the research team estimates that around 6,000 machines so far have been infected, earning the perpetrator behind OSDSoft around US$700 every day from this mining operation alone.

“The miners are currently distributed by websites disguised as a legitimate Adobe Flash Player update service, telling the victim that their Flash version is outdated. Clicking anywhere on the screen would result in the malicious executable being downloaded,” says Check Point.

“OSDSoft’s author does not want to waste any time in this campaign either, for while waiting for the Monerominer to download, the malignant websites additionally use the CoinHive cryptomining malware to mine through the browser and maximise his profits.”

Fake Adobe Flash Player update service that distributes the cryptominer.

What’s more, the smoke around the whole operation only increases as it is legitimate hosting and file storage services such as AWS (Amazon Web Services), Dropbox and Github, that are being used to store and distribute the malicious cryptomining samples.

Check Point says OSDSoft is a perfect case study detailing how a website started with seemingly innocent intentions can be lured ‘to the dark side’ by the attraction of high value cryptocurrencies to become a cryptomining distribution platform.

Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."