![]() The problem for cybercriminals is that too few people download anything from such resources.īut they found a way around that particular problem: If an app actually does what is promised in its description, and the malware is neatly disguised, it may slip through. Therefore, malicious apps of this sort are distributed mainly through forums and nonofficial stores. But Google Play and other official stores keep out such fakes or, if they do manage to sneak in, quickly find and remove them. Typical miners pretending to be handy tools or games don’t perform as described - instead, they show ads and covertly mine for cryptocurrency. Hidden miners can be picked up by downloading and running seemingly innocuous apps available on the official Google Play store. ![]() There’s no need for the device owner to knowingly install a miner or download an app from a dubious source. It’s actually alarmingly simple to infect a smartphone or tablet with a hidden miner. For those accustomed to feeding off other people’s processing power, the millions of devices out there present an opportunity too juicy to ignore. Of course, in terms of performance, mobile devices cannot hope to compete with desktop computers armed with the latest graphics cards, but in the eyes of cybercriminals, the sheer number of devices makes up for their lack of power. When it comes to mining, computing power matters. In fact, there is a chance that the problem may lie elsewhere - hidden mining, to be precise. ![]() But in the case of smartphones, sluggishness, overheating, or short battery life are usually put down to age. When a computer shows signs of slowing down, many tend to blame viruses.
0 Comments
Leave a Reply. |