KryptoCibule: the New Malware that Skips the Antivirus

We constantly see improvements in the security tools we use. Each update usually brings more protection to the operating systems, as well as the programs to prevent malware that we use. Now, hackers are also constantly improving their attack techniques and looking for ways to avoid detection. Today we are echoing KryptoCibule , a threat that bypasses the antivirus and maximizes the computer.

KryptoCibule, the malware that bypasses the antivirus

As we say, there are many threats on the network and they constantly improve the way they attack us. They always seek to reach the victim through very varied strategies and methods, but also improve in how to bypass security measures.

KryptoCibule: the New Malware that Skips the Antivirus

KryptoCibule is a new threat closely related to cryptocurrencies . On the one hand, it has the mission of stealing digital currency wallets and hijacking transactions that the victim may carry out.

But besides that it is also capable of mining cryptocurrencies in the system. What it does is take the hardware of the victim’s computer to the extreme to mine cryptocurrencies and thus obtain economic benefits. This is a problem that logically puts the proper functioning of the devices at risk, in addition to compromising the privacy of the users.

This threat has been discovered by ESET security researchers. They have indicated that it relies heavily on the Tor network to communicate with its command and control servers.

It mainly spreads through malicious torrents in files that pretend to be installers of pirted versions of popular software and games. When you start the executable, the malware installation starts in the background and once that cracked program should start, it runs in the foreground.

It is capable of mining cryptocurrencies without the victim knowing. This is a major problem, as many users may believe that they are not infected but in reality they are, and their computers are running at peak performance.

Qué es el malware wiper

How to avoid falling victim to this problem

Undoubtedly one of the most important points to prevent this type of threat is common sense . We have seen that in this case it arrives through torrent files. It is essential that we avoid downloading from untrustworthy sites that could compromise our equipment.

In addition, another fundamental issue is to always have security tools . Of course, we have seen that in this case this malware is capable of bypassing the antivirus. However, we must have software that can protect us and that they are always with the latest versions.

Finally, keeping computers with the latest patches and updates will also help us a lot. There are many vulnerabilities that can arise when surfing the net. There are many flaws that can be exploited by hackers to carry out their attacks. Therefore, we must always have the latest versions and be able to correct those security problems.

In short, this new threat is capable of maximizing our team to mine cryptocurrencies. We leave you an article with tips on how to maintain a secure network.