It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Majic
reply to post by jjf3rd77
That's not very conclusive, and absent substantial evidence, appears to rely on the idea that correlation proves causation.
As an example of why that's problematic, if the phone rings while I post to ATS, I could assume posting to ATS causes the phone to ring.
Is there any evidence you can offer, other than assumptions, that would show a connection between ATS and CoinMiner?
Originally posted by jjf3rd77
Yes you can send a virus that way through a hidden links and various other ways... I have seen it and done it!
Hold on, here. Are you saying you've deliberately planted viruses on others' computers?
Originally posted by jjf3rd77
I can't that's why I am asking the question. And no not to other's computers. I have done it in a network security lab a course I took at school!
Spotify is a quick and easy-to-use way to listen to your favorite tracks or albums without downloading, purchasing or waiting for buffering. While this new system for listening to music satisfies the need for tunes instantly, it doesn't come without drawbacks.
The Spotify Virus
anti-virus-software-review.toptenreviews.com...
In early 2011, a hacker used Spotify's third-party advertisements to spread a virus to users' computer systems. The malware infected computers without users clicking the ad, with a technique called an anti-virus hoax that used what is referred to as a Blackhole Exploit Kit, which is a tool kit for exploiting weak spots in software.
While using Spotify, the malware installed a virus called Windows Recovery AntiVirus. This fake security software scam is intent on convincing computer users that their systems are infected with viruses and that they need to buy an upgraded version of Windows Recovery to fix the problem. Of course, the only thing the users' computers are infected with is the Windows Recovery virus. Often, hoax software like this not only tries to scam you out of money, but it can also slow your computer down and spread to other computers in your network.
Interestingly, only a few people were affected by this virus because most users' computer security software blocked the malware and destroyed it before it could become a problem. This shows how important it is to install security software and to keep it updated while using software like Spotify.
Originally posted by Sauron
I think you may want to look at what software you are using.
Spotify is a quick and easy-to-use way to listen to your favorite tracks or albums without downloading, purchasing or waiting for buffering. While this new system for listening to music satisfies the need for tunes instantly, it doesn't come without drawbacks.
The Spotify Virus
anti-virus-software-review.toptenreviews.com...
In early 2011, a hacker used Spotify's third-party advertisements to spread a virus to users' computer systems. The malware infected computers without users clicking the ad, with a technique called an anti-virus hoax that used what is referred to as a Blackhole Exploit Kit, which is a tool kit for exploiting weak spots in software.
While using Spotify, the malware installed a virus called Windows Recovery AntiVirus. This fake security software scam is intent on convincing computer users that their systems are infected with viruses and that they need to buy an upgraded version of Windows Recovery to fix the problem. Of course, the only thing the users' computers are infected with is the Windows Recovery virus. Often, hoax software like this not only tries to scam you out of money, but it can also slow your computer down and spread to other computers in your network.
Interestingly, only a few people were affected by this virus because most users' computer security software blocked the malware and destroyed it before it could become a problem. This shows how important it is to install security software and to keep it updated while using software like Spotify.
Originally posted by cenpuppie
reply to post by DrMattMaddix
If he was computer savvy, then he would have had the proper safeguards in place. This wouldn't have happened in the end..
Originally posted by Dreamwatcher
I guess it is time for a little education here.
First off, you can make some really nice cash mining bit coins, I know I am a bit coin miner myself.
Miners are actually in the minority in terms of the bit coin currency exchange, most of the business is now done in accepting bit coins for goods and service. Exchanging the coins for other currency and speculative investing is also very large.
"Mining" is how transactions get done. Blocks are released which are really just (SHA256) encryption blocks with a sort of really difficult mathematical "puzzle" embedded. When a miner or pool solves the block, they get a 50 BTC reward along with the premium transaction fees associated with the transactions in the block. People offer up extra fractions of BTC to move their transactions faster, but the vast majority of transactions are done the free route (few minutes to a few days to become valid). Once a block is solved, it has to be verified 120 times separate from the now block owners account to become valid. Confirming a block is much easier than solving a block, so no puzzles or rewards for that.
Bit mining programs are not "virus" or Malware. In fact there is a small group of programers dedicated to making more efficient kernels for mining.A large chuck of them are open source, so you can see the coding for yourself.
Some of the most clever encryption hashing, NOT HACKING..LOL..solving encryption hashes legitimately, is coming out this community.
There is an art to running mining rigs and making a nice profit off it. It involves a delicate balance of power consumption vs hash rates and to a person into computers can be very fun and rewarding.
I am running short on time (I have class tonight myself, a systems design class) so I also want to leave you this.
I also have taken security classes and in fact this semester I am taking an ethical hacking course. I can almost guarantee the computers you used in your labs were not fully patched and as such vulnerable to attack. This is done purposely of course as a fully patched system is kind of a hard hack, putting aside social engineering of course. Even legit publicly available penetration testing software is normally a bit behind to give companies some time to patch systems before the exploit becomes completely publicly visible.
If anybody has any questions or is even up for discussion on BTC or even system security, i will check in after class. If there is enough interest maybe even start a thread on those subjects.
Originally posted by jjf3rd77
Originally posted by DrMattMaddix
Send a virus directly to your IP?
Yes you can send a virus that way through a hidden links and various other ways... I have seen it and done it!