LemonDuck is a new crypto-mining malware targeting Windows and Linux systems

A new malware has targeted Windows and Linux applications to use their computer resources in cryptocurrency mining operations Called LemonDuck, malware is gaining a reputation for being able to spread platforms quickly to maximize its attack power.

Flexible malware has been featured in recent Microsoft blog posts. As a post, LemonDuck is a “powerful and powerful malware” that is best known for its botnet mining and cryptocurrency operations.

Once in the system, LemonDuck is able to install cryptocurrency mining tools into it that consumes its processing power to make cryptocurrency illegal

Malware has now switched to data theft, removed security controls, and spread it into a program to allow the threat character to use more sophisticated tools.

Unusual property, however, is that it can infect both Linux and Windows devices. For this reason, Microsoft views it as a major threat to business setups where, in general, both OSs work in tandem.

In addition to new or popular defects, LemonDuck points to old weaknesses in these systems as well.

This means that the threatening character will be able to use malware effectively when the focus of the developers is to place a new or popular risk rather than investigate compromise.

As soon as it infects a system, malware downloads the dangers it once encountered.

This means that LemonDuck is able to prevent the infection of its system targeted at any other source. It even eliminates any other malware present on the damaged device.

The attacker thus has unprecedented authority to do the infection, in the shadows, of course.

LemonDuck uses several channels to gain access to new targets. It can be spread by spam emails to steal sensitive information, exploits, USB devices and other means.

Microsoft has also highlighted cases where hackers spread malware through a Covid-19 themed email attack.

LemonDuck first appeared in China in May 2019. Since then, it has spread to many other countries, including the United States, Russia, China, Germany, the United Kingdom, India, Korea, Canada, France and Vietnam as the most active regions.

Malware mainly affects businesses associated with the manufacturing and IoT sectors, often with multiple computers and as a result, processing power.

Prakash Bell, who leads customer success at Check Point Software Technologies, explains “Signed security technologies such as antivirus and intrusion detection systems (IPS) can only retain many signatures based on the current threat.

Detection technology is very limited in stopping such threats, esp. and they are crosses. ”

Therefore, there should be a thorough examination to prevent such attacks. Microsoft promises to provide the same with its Microsoft 365 Defender.

Check Point made a similar claim. Advice for regular PC users up to that point to follow basic online safety tests – use applications from trusted sources only, and do not fall into emails to steal specific information and likes.

Also see: Sony launched the ZV-E10 voting camera with a 24.2-megapixel sensor

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top