Hackers target smartphones to mine cryptocurrencies

AFP  |  Paris 

Has your suddenly slowed down, warmed up and the battery drained down for no apparent reason? If so, it may have been hijacked to mine

This new type of cyberattack is called "cryptojacking" by security experts.

It "consists of entrapping an internet server, a personal computer or a to install malware to mine cryptocurrencies," said Gerome Billois, an expert at the IT service management company

is basically the process of helping verify and process transactions in a given virtual currency. In exchange miners are now and then rewarded with some of the currency themselves.

operations link thousands of processors together to increase the power available to earn

bitcoin, ethereum, monero and other may be very profitable, but it does require considerable investments and generates

But hackers have found a cheaper option: surreptitiously exploiting the processors in

To lure victims, hackers turn to the digital world's equivalent of the Trojan horse subterfuge of Greek mythology: inside an innocuous-looking app or programme hides a malicious one.

The popularity of games makes them attractive for hackers.

"Recently, we have discovered that a version of the popular game Bug Smasher, installed from Play between one and five million times, has been secretly mining the cryptocurrency monero on users' devices," said researchers at IT security firm

The phenomenon is apparently growing.

"More and more hiding Trojan horses associated to a have appeared on the platforms in the last 12 months," said David Emm, a at Kaspersky Lab, a leading supplier of computer security and

"On mobiles the processing power available to criminals is less," but "there is a lot more of these devices, and therefore taking in total, they offer a greater potential," he added.

But for owners, the mining is at best a nuisance, slowing down the operation of the phone and making it warm to the touch as the processor struggles to unlock cryptocurrency and accomplish other task.

At worst, it can damage the phone.

"On devices, the computational load can even lead to 'bloating' of the battery and thus to physical damage to, or destruction of, the device," said

However, "users are generally unaware" they have been cryptojacked, said Emm.

Cryptojacking affects mostly running Google's

exercises more control over apps that can be installed on its phones, so hackers have targetted iPhones less.

But recently cleaned up its app store, Play, telling developers that it will no longer accept apps that mine cryptocurrencies on its platform.

"It is difficult to know which applications to block," said Pascal Le Digol, the in security firm WatchGuard, given that "there are new ones every day."

Moreover, as the miners try to "be as discreet as possible" the apps do not stand out immediately, he added.

There are steps to take to protect one's phone.

Besides installing an antivirus programme, it is important "to update your phone" to the latest version of the available to it, said at

He also noted that "people who decide to download apps from non-official sources are at more risk of inadvertantly downloading a malicious app".

Defending against cyberattacks of all kinds is "a game of cat and mouse", said Le Digol at "You need to constantly adapt to the evolution of threats."

In this case he said "the mouse made a large leap", said Le Digol, adding cryptojacking could evolve to other forms in the future to include all types of connected objects.

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Wed, August 22 2018. 14:45 IST