Messenger: Malware That Undermines Cryptocurrency

Messenger_ Malware That Undermines Cryptocurrency

Trend Micro security researchers have uncovered a malware that spreads via messenger messaging to cryptocurrency silently.

Trend Micro had already spotted FaceXWorm, a malware presented in the form of an extension dedicated to the Chrome browser and that was then intended to send messages to the user’s contacts on Messenger inviting them to click on a link to see a video. The malware invited to install a virtuous extension that was then responsible for stealing their Google credentials, Coinhie or Monero.

And the malware had not yet delivered all its secrets since it appears that it is also in the ability to exploit the host PC to undermine crypto devices without the knowledge of the user.

 Trend Micro security researchers have uncovered a malware that spreads via messenger messaging to cryptocurrency silently.
Messenger: Malware That Undermines Cryptocurrency

With this type of malware, cybercriminals have a potentially huge mining power that depends on the importance of the infection of the user pool. If Google had removed some extensions of its store, hackers multiply the outputs and hide the malware in various plug-ins.

The only parry proposed so far is to avoid clicking too fast on links shared by Messenger and not accept the installation of plug-ins returned by unknown links.

Ruth Karpenter

Ruth is the senior contributor to Weird News Ledger, and can’t really think of a better job than one that lets her read and write interesting stories on everything from aliens and asteroids to Bigfoot and the Loch Ness Monster. Ruth previously worked in magazines at Transcontinental Media and headed up the lifestyle department at Sun Media. Her Twitter bio describes her as a “reader, writer, eater,, fancy geek, summer cyclist,” which pretty much sums up how she spends her time outside of work.

Recommended For You

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: