Against the Egyptian government and organizations associated with it, accusations were made of infecting computers of its citizens with programs for the mining of crypto-currencies. Malicious software Coinhive has become known for its method of using the power of foreign computers to extract Montero crypto currency for its owner.

Recall that earlier, analysts at Check Point Software Technologies talked about the growing threat that Coinhive carries in itself.

According to new resources, researchers from the University of Toronto (UofT) proved that the Egyptian government infects local computers with mining malware. Earlier, Coinhive was accused of insecurity when malicious programs were discovered on 50 000 websites by WordPress.

Malicious software infects computers of Egyptians

Researchers from Citizens Lab, which are part of the UofT research team, conducted a series of tests. The Egyptian government was accused of using Adhose to infect computers. This program redirects users to malicious software that is used to run Monero.

The hardware used in Adhose has also become an instrument of censorship, as it blocks users from visiting websites such as Al Jazeera, Human Rights Watch, Reporters without Borders, Mada Masr, HuffPost Arabic and the like. This weakens government influence.

It is said that the legislatures use both ways of infecting computers – Spray and Trickle.

In Spray mode, users will be redirected to a malicious program or ad network with Coinhive. It is said that about 95% of all scanned devices were infected with such software.

The Trickle method is more popular than Spray. In this case, users are redirected only when they visit several selected websites, including CopticPope org, a previously religious website, and the Babylon-X com site.

Shawki Allam, the current Grand Mufti of Egypt, recently commented that the crypto currency is prohibited under Islamic religious law, since it is unstable and unreliable.

Author: Olga Novikova, Analyst Freedman Club Crypto News
Image from Fotolia

Source: Read Full Article

Leave a Reply