Feeds

New malware ferrets out and steals Bitcoins

Hopelessly devoted to you

Providing a secure and efficient Helpdesk

You know your virtual currency has hit the big leagues when criminals develop trojans that infect computers for the sole purpose of stealing it. Bitcoin, the open-source project launched two years ago, reached that turning point Thursday.

That's when researchers from Symantec discovered Infostealer.Coinbit, a piece of Windows malware that ferrets out the digital wallet stashed on Bitcoin users' hard drives and uploads it to an SMTP server that's probably located in Poland. It's the first report of a trojan in the wild that targets the digital cash, but Symantec researchers said its only a matter of time until the feature is found in other pieces of malware.

“If you use Bitcoins, you have the option to encrypt your wallet and we recommend that you choose a strong password for this in the event that an attacker is attempting to brute-force your wallet open,” Symantec's Stephen Doherty wrote in a blog post.

The advice makes sense, since Bitcoins are just like cash in the sense that they lack any sort of intrinsic method of tracking the thief. The digital currency's peer-to-peer architecture was designed from the ground up to foster transactions that can't be reversed and to allow users to remain anonymous. A Bitcoin user calling himself Allinvain claims to have learned that lesson the hard way when, he said, someone stole coins theoretically valued at $500,000.

But this irreversibility points to a potential risk of following Symantec's advice to encrypt the wallet: Lose the key and your coins will be lost forever.

A separate Symantec researcher, Peter Coogan, has theorized a separate way online crooks could profit handsomely from a Bitcoin feature that allows users to “mine” coins by contributing CPU cycles to solving a cryptographic problem. Criminals wielding a botnet of 100,000 infected machines, for example, could generate $97,000 per month, assuming all nodes worked on the problem continuously. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.