{"id":197415,"date":"2017-06-08T22:48:58","date_gmt":"2017-06-09T02:48:58","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/linux-malware-enslaves-raspberry-pi-to-mine-cryptocurrency-zdnet\/"},"modified":"2017-06-08T22:48:58","modified_gmt":"2017-06-09T02:48:58","slug":"linux-malware-enslaves-raspberry-pi-to-mine-cryptocurrency-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/linux-malware-enslaves-raspberry-pi-to-mine-cryptocurrency-zdnet\/","title":{"rendered":"Linux malware enslaves Raspberry Pi to mine cryptocurrency &#8211; ZDNet"},"content":{"rendered":"<p><p>    Older Raspberry Pi devices, such as this    Raspberry Pi 2, may be more vulnerable to the malware if they    haven't been updated in a while.  <\/p>\n<p>    Someone has developed a simple Linux trojan designed to harness    the meager power of Raspberry Pi devices to mine    cryptocurrency.  <\/p>\n<p>    Raspberry Pi users may need to consider applying a recent    Raspbian OS update to their devices, particularly if they are    currently configured to allow external SSH connections.  <\/p>\n<p>    According to Russian security firm Dr Web, the malware Linux.MulDrop.14 exclusively targets Raspberry Pi    devices to use their processing power to mine a cryptocurrency.  <\/p>\n<p>    Dr Web discovered the Raspberry Pi mining malware after its    Linux honeypot machine became infected with it. The malware    uses a simple Bash script to attempt to connect to Raspberry Pi    devices configured to accept external SSH connections. It    targets Raspberry Pi boards with the default login and    password, which are 'pi' and 'raspberry', respectively.  <\/p>\n<p>    It then changes 'pi' to    '$6$U1Nu9qCp$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1'.  <\/p>\n<p>    From there it installs the internet-scanning tool ZMap and the    sshpass utility, and searches the network for other devices    with an open port 22 to infect them.  <\/p>\n<p>    Older Raspberry Pi devices may be more vulnerable to this    malware if they haven't been updated in a while. The Raspberry    Pi Foundation told ZDNet sister site TechRepublic that    a Raspbian OS update released late last year turned off SSH by default and forced users    to change the default password.  <\/p>\n<p>    However, it warned that there could still be millions of    Raspberry Pi boards that haven't been updated. Some 12.5    million of the single-board computers have been sold over the past five years, according    to the official Raspberry Pi Magazine.  <\/p>\n<p>    The malware doesn't try to mine for Bitcoin, whose 'difficulty level'    is too high to mine cost-effectively, even for a massive    network of PCs let alone Raspberry Pi devices.  <\/p>\n<p>    However, there are numerous other cryptocurrencies that can be    mined with less computational power. In 2014, malware writers    experimented with Android malware to mine Dogecoins and    Litecoins. Dr Web's virus analysts said the Raspberry Pi    malware mines Monero, a lesser-known, but increasingly popular    cryptocurrency for dark-web drug markets.  <\/p>\n<p>    Researchers in May discovered that a network of     several hundred thousand PCs infected with the Adylkuzz    mining malware, which used the same Windows exploit behind the    WannaCry ransomware epidemic, had been toiling away on Monero    blocks. At the time, Adylkuzz had generated about $43,000 over    several months of mining activity.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/article\/linux-malware-enslaves-raspberry-pi-to-mine-cryptocurrency\/\" title=\"Linux malware enslaves Raspberry Pi to mine cryptocurrency - ZDNet\">Linux malware enslaves Raspberry Pi to mine cryptocurrency - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Older Raspberry Pi devices, such as this Raspberry Pi 2, may be more vulnerable to the malware if they haven't been updated in a while. Someone has developed a simple Linux trojan designed to harness the meager power of Raspberry Pi devices to mine cryptocurrency <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/linux-malware-enslaves-raspberry-pi-to-mine-cryptocurrency-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-197415","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/197415"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=197415"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/197415\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=197415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=197415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=197415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}