Symantec has recently announced that it has found a number of Potentially Unwanted Applications (PUAs) in Microsoft store. PUA is a kind of software which is installed on the system on the background without asking the user’s permission. This software can influence the user’s security. Therefore, antiviruses are continuously fighting such software. PUAs might show intruding advertisements on the system or use the system resources to suit the developers’ purposes. Such kind of software which uses the user’s system resources to mine cryptocurrencies is called cryptojacking or cryptominer. The increase in cryptocurrencies’ value has provoked many cyber criminals to develop and distribute such malicious software, in a way that we have seen the development of its different types in recent years. According to Symantec, it has discovered these eight malicious programs on January 17 and informed Microsoft too. Microsoft removed them after receiving the report accordingly.
These eight destructive programs include Fast-search Lite, Battery Optimizer (Tutorial), VPN Browser+, Downloader for YouTube Videos, Clean Master+ (Tutorial), FastTube, Findoo Browser 2019, and Findo Mobile and Desktop Search. According to the report by Symantec, all eight programs addressed Monero mining without users’ awareness. Moreover, further investigations by Symantec showed that all mentioned cryptojackings have been done and distributed by one or a group of designers; although distributed by three developers, namely, Findoo, 1clean, and DigiDream developers.
These programs have been published from April to December 2018; although, they have been in Microsoft store for a short time, but a significant number of them have been downloaded and installed. Of course, it is not possible to estimate the exact number of users due to fake reviews.
Security companies advise following precautions for the user’s security against cryptojackings:
• Keep your functional software up-to-date.
• Don’t download software from unknown sites.
• Install your functional programs just from trustful resources.
• Pay attention to the requested permissions by the software.
• Pay attention to the CPU and memory usage.
• Install suitable security programs on your system
• Make a backup from your important data regularly