MacOS: BitCoinMiner-AS Malware – How to Remove It from Your Mac

The MacOS: BitCoinMiner-AS is a malware cryptocurrency miner which can infect target hosts using a variety of different methods. Infections with it can lead to the deployment of other threats and consequences upon the victims include a degradation of system performance and the inability to use the computers in a normal way. Learn how to restore your Mac OS X computers from active infections by following our in-depth article.

Threat Summary

NameMacOS: BitCoinMiner-AS
TypeCryptocurrency miner for Mac OS X
Short DescriptionA malicious script that takes advantage of the available system resources which in turn generates income for the hacker operators.
SymptomsVictims will notice severe system performance issues.
Distribution MethodBundled downloads, malicious scripts and other methods.
Detection Tool See If Your System Has Been Affected by MacOS: BitCoinMiner-AS

Combo Cleaner
Malware Removal Tool

User ExperienceJoin Our Forum to Discuss MacOS: BitCoinMiner-AS.

MacOS: BitCoinMiner-AS – How Did I Get It

MacOS: BitCoinMiner-AS is a specific cryptocurrency miner that is made compatible with Mac OS X computers. It can come under the form of a JavaScript code found on hacker-controlled or hijacked pages. These websites may be popular sites or communities that the users visit or fake copies of them. Any counerfeit copies of sites can utilize design elements and similar sounding domains to the legitimate versions. The only warning sites of infections are overall performance issues as most of the malicious code is executed directly without prompts or pop-ups.

Other methods that can be used to spread the infection includes the installation of infected software installers. They are made by taking the legitimate installers from the official vendor download sites and modifying them with the virus code. Targets are applications that are popular with end users: creativity suites, sytem utilities and productivity software.

Using malicious documents (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: