The WinstarNssmMiner virus is a stealth Trojan that can infect computer networks and infiltrate both end users and enterprise targets. It takes advantage of the available computer resources in order to generate income for the operators.
WinstarNssmMiner – How Does It Infect
The WinstarNssmMiner miner is deployed using the traditional distribution tactics for this type. A common way is to integrate the miner code in payloads. Two popular examples are the following:
- Infected Documents — The WinstarNssmMiner miner code can be embedded in files such as text documents, spreadsheets or presentations. Once the users open the files they will be presented with a notification prompt that asks the victims to enable the built-in macros (scripts). When this is done the virus code will be downloaded from a remote server and loaded onto the target system.
- Software Installers — The code can be embedded in a similar way in application installers of popular software. The hackers typically choose well-known products such as productivity solutions, creativity suites, system utilities and etc.
These payloads can be uploaded to fake download portals that may be designed to look like legitimate web services. They are done by setting up similar domain names and using stolen graphics and text, as well as other (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: https://sensorstechforum.com/winstarnssmminer-virus-cryptocurrency-miner-remove/