The Monero community has decided to publicly denounce individuals behind a gigantic crypto mining malware campaign that was created to steal the computing power of users and illegitimately use them to get XMR tokens.
According to an official statement, the Monero community condemns the practice of using malware and non-consensual mining tactics and it has affirmed that it will not stand idle while the victims are being affected.
The community has decided to create a self-organized set of volunteers to provide the tools and the resources that are necessary for people to have an additional protection against crypto jackers and other malicious hackers. The Monero Malware Response Workgroup was created as an official and sanctioned resource for people who want to protect themselves as part of this initiative.
Crypto Jackers Love Monero
Cryptojacking is the process in which a hacker installs a malware into a computer and then forces the machine to mine cryptos. After that, these tokens are stolen from the person who mined then and sent to the wallet of the attacker without the knowledge of the user.
There is a reason why Monero (XMR) is so popular in crypto jacking schemes. Many hackers have been known to use it, especially because the software is fully private and it is impossible to track it, then, it is a good token to mine, steal and then use it in illegal activities.
Hackers have been known to use a modified version of the CoinHive browser-mining script to mine and estimates suggest that these people are able to mine at least $250,000 worth of XMR every month.
The main problem is that this creates a bad image for Monero as the privacy coins end up compared to scammers and hackers and its community, which is mainly focused on privacy, not necessarily illegal activities (although we do not have means to know whether they do it or not) get a bad rep.
However, things are definitely changing as this is the first time that the community has decided to publicly denounce this type of situation. According to the people at the community, while they are not able to remove the threat completely, they hope that there will be some way to help the people who need more protection or education.
The Coinhive Malware Is Spreading Quickly
According to research, the Coinhive malware is quickly spreading around the world and it has released over 2.5 million new scripts that are used for crypto jacking in the last few months. Reports suggest that there are over 280,000 MicroTik routers infected all over the world and this has led the company to create a patch that will help these people to clear out their system from the malware.
The case is so severe that even government institutions have been attacked by this type of malware like the main service provider for the Douglas County PUD, a U. S. nonprofit company that has close ties with the government. Many Indian municipality sites have also been attacked by Monero cryptojacking malware.
If you think that your machine may be infected, you should visit the Malware Response Workgroup for support.