Five Cryptojackers Arrested in South Korea

Today is the day of reckoning for five cryptojackers in South Korea, who just got arrested. The cryptojackers are being accused of compromising computers with crypto mining malware. So far, they have infected more than 6,000 computers.

South Korean Cryptojackers Arrested

The South Korean authorities have made it known in a recently released report that the five suspects are being led by a 24-year-old named Kim Amu-gae. The report also made it known that the hackers attack by sending corrupted emails to their victims. So far, more than 32,435 emails containing cryptocurrency mining malware has been sent to users based in South Korea.
These emails serve as the tool through which the malware get transported into their victim’s account. The content of the email sent is mostly about job openings. The hacker stands as employers who are in need of job seekers to fill a lucrative position.

This was made possible simply because there already exists a database across numerous job seeking websites. All the cryptojackers need do is to hack into the database and steal these email addresses. The report made it known that on this recruitment platforms and job listing portals, the hackers were able to access more than 30,000 email addresses of job seekers. Once the email addresses were gathered, impersonating recruitment agents and potential employers is the next step. The final step is uploading the virus and then having it sent to all these applicants.

Malware is Hidden in an Email

The emails sent usually contains the malware the hackers are trying to have installed in the unsuspecting victim’s computer. Since the email looks credible and its coming from a “potential employing” the recipient’s of the email readily click on it. Once the email is open and the file attached to it gets downloaded, the document system becomes corrupted.

Fortunately, the presence of advanced anti-virus software, has made helped with detecting this virus and have them deleted within three to four days of getting installed into the system.

Source: Read Full Article