Service receive & sending SMS

Routers can turn into cryptocurrency zombies

1588   |     /   IT

Routers can turn into cryptocurrency zombies
Somewhere there, a cybercriminal is stuffing his pockets with cryptocurrency. Whoever it is, he does not use powerful computers for mining. Instead, this man uses an ever-growing army of enslaved routers to do the dirty work.

To register for avito it is not necessary to use your personal mobile number, just visit our website that provides SMS reception online and rent a virtual number for your purposes.

Trustwave researchers have discovered a new strain of malware designed for a particular brand of routers. Devices manufactured by MicroTik are targeted and more than 200,000 are currently infected.

You may be wondering how this is possible for a router. Not that they advertised such functionality on packaging. The fact is that inside the router there is a processor that is very similar to the processor in your smartphone or tablet. It is less powerful, but still able to do much more than connect you to the Internet and manage wireless connections.

Malicious software may not seem so serious. It does not plan to steal your passwords or credit card numbers, and it does not encrypt your files and does not require a ransom. However, this can cause a lot of trouble.

Mining for cryptocurrency can create a very large load on the processor. A large load leads to the fact that processors emit a lot of heat. If this heat is not dissipated, it can seriously degrade the performance of the device. In extreme cases, this can lead to device failure ... sometimes it can even break down.

Some smartphones that were infected with malware actually got hot enough to melt. This is a huge problem in a portable device that runs on a lithium-ion battery, and the high temperature still causes a serious problem with a router or broadband modem.

If you have a Microtik router, you can protect yourself from this vulnerability - and others like it - by installing the latest firmware. Trustwave notes that MicroTik has released a patch to block this particular attack.

Similar news

Advanced malware for Mac and Linux attacks crypto exchange

For almost a decade, Lazarus has been conducting hacking campaigns around the world. The group, which is suspected of having ties to the North Korean government, has also been linked to several high-profile cryptocurrencies.

What is the Google Titan Security Key?

Securing your online accounts from hackers requires careful consideration, dedication, and fairly good memory. Even if you try your best, there is always a chance that hackers will find a way out ... unless you add another layer of protection.

Monitor wiretapping by hackers, myth or reality?

Sounds made by the monitor will help hackers determine the image that is currently displayed on the screen.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved