![]() The two apps associated with ANDROIDOS_JSMINER were a promotional app called SafetyNet Wireless App and an app based on the rosary called Recitiamo Santo Rosario Free. After loading the library onto the victim’s device, they rely on their own site key to begin mining. The ANDROIDOS_JSMINER apps use a Javascript-based cryptocurrency miner from Coinhive. SEE: Mobile device computing policy (Tech Pro Research) Back in March 2014, the ANDROIDOS_KAGECOIN app was being used to mine currencies like Bitcoin, Litecoin, and Dogecoin. To avoid detection, the apps use techniques such as dynamic JavaScript loading and native code injection, the post noted.ĭespite the novelty of cryptocurrencies, this isn’t the first time that Trend Micro has detected such apps in the Google Play store. The apps have been detected as ANDROIDOS_JSMINER and ANDROIDOS_CPUMINER, the post said. ![]() Malicious Android apps recently detected in the Google Play store are being used to mine cryptocurrency from victim devices, security firm Trend Micro reported in a blog post.
0 Comments
Leave a Reply. |