Spider-Man: No Way Home movie torrent download contains crypto mining malware

Spider-Man: No Way Home movie torrent download contains crypto mining malware

Spider-Man: No Way Home movie torrent download contains crypto mining malware For Daily EditorBitcoin

A torrent download of Spider-Man: No Way Home may contain crypto malware, warns a cybersecurity company.

***

Cryptocurrency malware found in a torrent download of the new movie from Marvel Spider-Man: No Way Home, cybersecurity firm warned Reasonlabs, according to review Bitcoin.com. “This miner [cripto] adds exclusions to Windows Defender, creates persistence and generates a watchdog process to maintain its activity “the company explained in a note.

Reasonlabs issued the warning on Thursday, before Christmas, saying that found cryptocurrency malware in a torrent download of the hit new movie Spider-man

Reasonlabs, providing enterprise-grade cyber protection for users around the world, noted that “pTo attract as many victims as possible, attackers must keep up with current affairs. “ And that is why they use topics that are very fashionable, that everyone talks about. The cybersecurity firm indicated:

In this case, we are dealing with someone who has placed a Monero miner in a torrent download of what appears to be the new movie Spider-Man: No Way Home.

Malware in Spider-Man

Spider-Man: No Way Home from Sony / Marvel has reached the one billion dollar mark at the box office, according to the media, which makes it the highest grossing film of 2021. The third installment of the series Spider-man by Tom Holland, No way home It is the first film released during the Covid-19 pandemic which managed to reach the USD $ 1 billion mark.

See also  Phishing campaign is stealing cryptocurrencies from Metamask and Phantom wallet users

Reasonlabs explained:

“The file identifies itself as ‘spiderman_net_putidomoi.torrent.exe’, which translates from Russian to ‘spiderman_no_wayhome.torrent.exe’.”

The firm believes that the file likely originated from a Russian torrent website.

Add that the miner adds exclusions to Windows Defender, it creates persistence and generates a vigilance process to maintain its activity.

“Malware tries to avoid eye exams by using ‘legitimate’ names for the files and processes it creates; for example, it claims to be from Google and drops files with names like sihost64.exe, and injects them into svchost.exe ”, described Reasonlabs.

The cybersecurity firm warned that An easy precaution is to always verify that the extension of the file being downloaded matches that of the file being downloaded. For example, a movie file must end with “.mp4” and not with “.exe”. The firm added that “To make sure you see the actual file extension, open a folder, go to ‘View’ and check ‘File name extensions’. This will ensure that you see the full file type. ” Full analysis of this malware can be found here.

Insistent malware

As has counted DiarioBitcoin, There are many ways that mining malware tries to trap users. In 2020, it was reported that more than 35,000 computers of Latin American users were infected with Monero mining malware. In December 2019, a photo of singer and actress Taylor Swift was also infected with Monero mining malware.

See also  Celsius Network doubles Bitcoin mining investment to $ 300 million

Also, earlier this month, Google took steps to disrupt a botnet that was leveraging the blockchain of Bitcoin to spread malware among thousands of Windows devices.

Sources: Reasonlabs, Bitcoin.com, archive

Version of Daily bitcoin

Picture of Unsplash

Leave a Comment

Your email address will not be published. Required fields are marked *