Skip to main content

Apps are mining Bitcoins without your knowledge, says Malwarebytes

what is bitcoin
Image used with permission by copyright holder

Security software firm Malwarebytes has uncovered an application that employs the computers of unwitting users to mine Bitcoins. Permission to use machines in this way is buried deep in the software’s End User License Agreement (EULA), said Malwarebytes’ Adam Kujawa in a blog posting.

Back on November 22 the antivirus outfit received a query from a user about a process that was taking up 50 percent of the resources on his system. The executable to blame was quickly discovered to be mining for Bitcoins on behalf of its developer.

“We did some research and found out that the file in question was a Bitcoin Miner known as jhProtominer, a popular mining software that runs via the command line,” said Kujawa. “However, it wasn’t the miner recreating its own file and executing but a parent process known as monitor.exe.”

After some further digging, Malwarebytes staff found that the blame lay at the feet of We Build Toolbars LLC, a company responsible for a free Wi-Fi proxy utility. “Monitor.exe beacons out constantly,” explains Kujawa, “waiting for commands from a remote server, eventually downloading the miner and installing it on the system.”

The practice is covered by the program’s EULA, which says: “As part of downloading a Mutual Public, your computer may do mathematical calculations for our affiliated networks to confirm transactions and increase security. Any rewards or fees collected by WBT or our affiliates are the sole property of WBT and our affiliates.”

Kujawa is warning users to keep an eye on their systems: “So take note if your system is running especially slow or if a process is taking up massive amounts of your processing power; it might be malware or even a PUP (Potentially Unwanted Program) running a miner on your system.”

Malware and adware companies looking to cash in on popular search terms and tech topics is nothing new, and the safety advice is always the same: keep a good-quality security software package on your computer, keep your browsers and applications right up to date, be wary of installing anything you’re not sure of… and pay close attention to the EULA you’re agreeing to.

David Nield
Dave is a freelance journalist from Manchester in the north-west of England. He's been writing about technology since the…
What is Bitcoin mining?
what is bitcoin mining

Bitcoin mining is far removed from the average Bitcoin owner these days, but that doesn't change how important it is. It's the process that helps the cryptocurrency function as intended and what continues to introduce new Bitcoins to digital wallets all over the world.

Collecting cryptocurrency can be boiled down to a simple premise: "Miners," as they are known, purchase powerful computing chips designed for the process and use them to run specifically crafted software day and night. That software forces the system to complete complicated calculations -- imagine them digging through layers of digital rock. If all goes to plan, the miners are rewarded with some Bitcoin at the end of their toils.
Why do we need mining?
Bitcoin works differently from traditional currencies. Where dollars, pounds, and euros, for instance, are handled by banks and financial institutions that collectively confirm when transactions occur, Bitcoin operates on the basis of a public ledger system. In order for transactions to be confirmed -- to avoid the same Bitcoin from being spent twice, for example -- a number of Bitcoin nodes, operated by miners around the world, need to give it their seal of approval.

Read more
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more