Digmine Cryptocurrency Mining Malware Being Spread via Facebook Messenger: Trend Micro

Advertisement
By Indo-Asian News Service | Updated: 25 December 2017 16:35 IST
Highlights
  • Digmine malware said to only affect Messenger's desktop, Web versions
  • Digmine was first observed in South Korea
  • It has since spread to Vietnam, Thailand, and other countries
Digmine Cryptocurrency Mining Malware Being Spread via Facebook Messenger: Trend Micro

A new cryptocurrency-mining bot, named "Digmine", that was first observed in South Korea, is spreading fast through Facebook Messenger across the world, Tokyo-headquartered cyber-security major Trend Micro has warned.

After South Korea, it has since spread in Vietnam, Azerbaijan, Ukraine, the Philippines, Thailand, and Venezuela. It is likely to reach other countries soon, given the way it propagates.

Facebook Messenger works across different platforms but Digmine only affects the Messenger's desktop or Web browser (Chrome) version. If the file is opened on other platforms, the malware will not work as intended, Trend Micro said in a blog post.

Digmine is coded in AutoIt and sent to would-be victims posing as a video file but is actually an AutoIt executable script.

Advertisement

If the user's Facebook account is set to log in automatically, Digmine will manipulate Facebook Messenger in order to send a link to the file to the account's friends.

The abuse of Facebook is limited to propagation for now, but it wouldn't be implausible for attackers to hijack the Facebook account itself down the line. This functionality's code is pushed from the command-and-control (C&C) server, which means it can be updated.

Advertisement

A known modus operandi of cryptocurrency-mining botnets and particularly for Digmine (which mines Monero), is to stay in the victim's system for as long as possible. It also wants to infect as many machines as possible, as this translates to an increased hash rate and potentially more cybercriminal income, the blog post stated.

The malware will also perform other routines such as installing a registry autostart mechanism as well as system infection marker. It will search and launch Chrome, then load a malicious browser extension that it retrieves from the C&C server.

Advertisement

If Chrome is already running, the malware will terminate and relaunch Chrome to ensure the extension is loaded. While extensions can only be loaded and hosted from the Chrome Web Store, the attackers bypassed this by launching Chrome via command line.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17 to Feature Slightly Larger Display Than iPhone 16, Tipster Says
  2. Samsung Galaxy M36 5G Launched in India: Price, Specifications
  3. OpenAI Said to Turn to Google's AI Chips to Power Its Products
  1. OpenAI Said to Turn to Google's AI Chips to Power ChatGPT and Other Products
  2. Samsung Tipped to Unveil Tri-Fold Smartphone With Galaxy Z Fold 7, Z Flip 7; Launch Timeline Leaked
  3. iPhone 17 to Feature Slightly Larger Display Than iPhone 16, Tipster Claims
  4. Microsoft's Next-Gen AI Chip Production Reportedly Delayed to 2026
  5. Dead NASA Satellite Relay 2 May Have Caused Mysterious 2024 Radio Burst
  6. James Webb Telescope Captures First Direct Image of Saturn-Mass Exoplanet
  7. James Webb Telescope Detects Methanol and Ethanol Near Young Stars, Hinting at Life’s Origins
  8. Rubin Observatory Captures Distant Nebulae From Chilean Mountaintop
  9. Apple to Expand Swift Language Support to Android; Sets Up Android Working Group
  10. FBC: Firebreak Has Crossed One Million Players, Remedy Confirms
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.