Hacking creates a new weapon 'cryptogging', targeting hackers such a smart phone

in #cryptojacking6 years ago

Is your smartphone suddenly slowed down, has started heating up, and its battery is ending soon without any apparent reason?
crypto.jpg
Is your smartphone suddenly slowed down, has started heating up, and its battery is ending soon without any apparent reason? If so, then it may be that the crypto is being used in 'mining' of the taxis. Security experts have named this new type of cyber attack as "cryptojaking". 'Mining' is basically a process that helps in verifying and completing transactions in virtual currency (virtual currency). In return, miners are often given some currency as a reward.
China hacks computer data from US Navy
Expert in the IT service management company Vaibhoston, Jerome Bilois said that it involves trapping an Internet server, a personal computer or a smartphone in its net so that 'malware' can be inserted for mining of cryptocurrency. Thousands of processors are added together in the operation of 'mining' so that the available calculation power (computing power) can be increased for the use of crypto drones. Mining of bitcoin, Etherium, monero, and other cryptos can be very profitable, but it requires a lot of investment and electricity bills are too high.
These are the 5 most dangerous hackers, NASA also feared them.

Expert in the IT service management company Vaibhoston, Jerome Bilois said that it involves trapping an Internet server, a personal computer or a smartphone in its net so that 'malware' can be inserted for mining of cryptocurrency. Thousands of processors are added together in the operation of 'mining' so that the available calculation power (computing power) can be increased for the use of crypto drones. Mining of bitcoin, Etherium, monero, and other cryptos can be very profitable, but it requires a lot of investment and electricity bills are too high.
These are the 5 most dangerous hackers, NASA also feared them.

Comments
But hackers have found an affordable option: they are stealthily exploiting processors in smartphones. In order to lure victims of cryptogaking, hackers resort to the equivalent of the digital world of Trojan Horse subterfuse of Greek mythology. In this, an app that looks unhealthy. Apps with games are very attractive to hackers.