Criminals conceal miners under the guise of legitimate thematic applications: Kaspersky

ANI  |  New Delhi [India] 

Multinational cybersecurity and anti-virus provider, Kaspersky Lab's researchers have discovered that more and more cybercriminals are turning their attention to that is cryptocurrencies at the expense of the users'

These criminals are getting greedier and now use not only malware but also risk tools, hiding capacities in popular football and Virtual Private Network (VPN) applications to profit from hundreds of thousands of victims without their knowledge.

The hot topic of could not be ignored by cybercriminals, as they seek to increase their profits.

They are on computers, servers, laptops and

However, it is not only malware that they use.

The experts at found evidence showing that criminals are adding capacities into and spreading them under the guise of football broadcasting and applications - with and as the main victims.

According to data, the most popular "legitimate miners" are

Their main function is to broadcast football videos while discreetly cryptocurrencies.

For this, developers used the

When users launch the broadcast, the application opens an file with the embedded, converting visitors' CPU power to the Monero cryptocurrency for its author's benefit.

The applications were spread via the and the most popular of them was downloaded around 100,000 times.

Nearly all (90 percent) of these downloads originated from

Legitimate applications, responsible for VPN-connections, became the second target for malicious miners.

A is a Virtual Private Network, via which users, for instance, can get access to web resources, that would not otherwise be available due to local restrictions.

found the miner, which is able to monitor the battery charge and the temperature of the device - to obtain money with less risk for the attacked gadgets.

For this, the app downloads an executable from the server and launches it in the background. was downloaded over 50,000 times - mostly by users in and

products successfully detect these applications as

"Our findings show that authors of malicious miners are expanding their resources and developing their tactics and approach to perform more effective They are now using with capacities to feed their greed. As such, they are able to capitalise on each user twice - firstly via an ad display, and secondly via discreet crypto-mining," said Roman Unuchek, at

researchers advise users to abide by the following measures in order to protect their devices and private data from possible cyber attacks:

- Disable the ability to install applications from sources other than official app stores.

- Keep the OS version of your device up to date in order to reduce vulnerabilities in the software and lower the risk of attack.

- Only choose applications from trusted and reliable vendors - especially those which are geared towards safeguarding your privacy when online (e.g., VPN).

- Install a proven to protect your device from cyber attack.

- To learn more about the development of mobile miners, read our blogpost on Securelist.com.

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Mon, April 09 2018. 17:40 IST