Home Cryto Mining Sites Hijacks Millions of Android Phones to Mine Monero

Cryto Mining Sites Hijacks Millions of Android Phones to Mine Monero

PC’s aren’t the only ones vulnerable to Crypto mining hijackers as some malicious sites and infected apps are redirecting millions of Android users to a website that hijacks their phone processors for mining a cryptocurrency called Monero. This process is called Cryptojacking. The site redirects people towards a specifically designed page “performing in-browser crypto mining” after claiming that suspicious web activity was noticed. You are required to enter a code to stop the mining activity, however, after entering the code you will be directed to Google’s homepage. Malwarebytes discovered five internet domains using the same CAPTCHA code and the Coin hive site keys used for the campaign.

The exact technique used by these hackers is not yet known, but Malwarebytes reveals that the Android devices were hacked so that their phone processors could be used to mine cryptocurrency. Users may likely download infected apps that quickly redirect them to a website and they are asked to enter a valid CAPTCHA code which results in a spike in processor use. Users seem to spend an average of 4 minutes on the pages but that is just about enough mining time. The hackers seemed to have mined a large amount of cryptocurrency as two of the discovered sites had over 30 million visits per month, and the combined domains had more than 800,000 visits per day.
Smartphone users are advised to download apps from Google Play Store alone rather than free downloads from untrusted third-party marketplaces. There is a less likely chance to get infected programs from the Play Store. Google Play Protect has been credited for its ability to spot malicious apps stealing information or allowing hijacks. Last year, Google took down 700,000 apps that were found to be violating its policies. Malwarebytes also recommends keeping your phone safe by using web filters and security software. These Trojanised apps are not the only means through which your smartphones and tablets can be hijacked for crypto mining, your smartphones can also be infected via redirects and pop-unders.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.