PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Using stolen computer processing cycles to mine Bitcoin

Who does it and how much do they make?

Using stolen computer processing cycles to mine Bitcoin
2014-02-25
(Press-News.org) A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile. Researchers examined more than 2,000 pieces of malware used by Bitcoin mining operations in 2012 and 2013. They were able to estimate how much money operators made off their operations and which countries were most affected. The computer scientists report that the revenue of 10 of the mining operations they studied reached at least 4,500 Bitcoin over two years. This may not seem like much, but Bitcoin's value increased from about $10 to about $1,000 during that time, with a peak of $1,100 in November 2013. One Bitcoin is currently worth about $618. Bitcoin mining is particularly attractive for malware operators because of its low cost and because it requires little to no investment in any kind of infrastructure. "At the current stratospheric value of Bitcoin, miners with access to significant computational horsepower are literally printing money," said Danny Huang, a Ph.D. student in computer science and the first author on the study. This has the potential to change the game in malware, explained Alex Snoeren, a professor of computer science at the Jacobs School of Engineering at UC San Diego, and one of the paper's co-authors. "If it ever becomes very profitable, it could reinvigorate the malware industry," he said. The study is part of a larger effort by computer scientists at UC San Diego to better understand how malware operators make money, from sending spam to stealing personal information, such as credit card numbers. "These transactions show how society and technology shape each other," said Huang. Researchers will present their paper, "Botcoin: Monetizing Stolen Cycles," at the Network Distributed System Security conference Feb. 23 to 25 in San Diego. To track down transactions, researchers used techniques developed by their colleague and co-author, Sarah Meiklejohn, a Ph.D. student at the Jacobs School of Engineering. The study was conducted in partnership with George Mason University, UC Berkeley and the International Computer Science Institute. Following the money Most of the infected computers were located in Europe. But the malware could be found in Asia and Latin America as well. The United States was not immune either. For example, ZeroAccess, a well-known malware operation, conducted mining via at least 2,600 computers it controlled in this country. In all, PCs were infected in more than 60 countries, from Brazil, to Mexico, Vietnam, France, Turkey and Bulgaria. Most of the major players were well-known malware operators. They collected anywhere from a few hundred to a few thousand Bitcoin over the period researchers surveyed, from December 2011 to November 2013. Most botnet managers moved the Bitcoin they mined into exchanges where they could be converted into dollars within a few days, suggesting that they planned to cash in their profits quickly. "We wanted to know if these were Bitcoin enthusiasts who turned to the dark side," said Kirill Levchenko, a research scientist and one of the paper's lead authors. "This behavior suggests they're not." Bitcoin mining by malware operators took off in 2011 and was fairly widespread last year. It's less common now, due to ever-increasing computational requirements to mine Bitcoin. Evidence suggests that some operations have moved on to Litecoin, another online currency. At the height of the Bitcoin rush, botnet operators with 10,000 PCs in their network could make about $100 dollars a day. But as the currency's popularity increased, the computational resources required to mine it grew exponentially. As a result, that 10,000 PC-botnet would only make less than $10 a day today. Snoeren and colleagues believe that at this point, malware operators are not building botnets to exclusively mine Bitcoin. But botnet operators likely added mining to their portfolio of malware operations, such as spam and denial of service attacks. Mining is complimentary to other malware activities such as sending SPAM and conducting click fraud, and has low overhead costs, Snoeren explained. "It's easy money," he said. Botnets and Bitcoin mining: how it works Malware operators take over computers by exploiting vulnerabilities in browsers or browser plug-ins, such as Java and Flash. The malware infects computers with a series of programs that make the machines perform illegal activities. The computers are connected as a network, known as a botnet. Operators can then combine the computers' computational power to perform the complex calculations required to mine Bitcoin. Mining Bitcoin is much like taking part in a lottery, Snoeren explains. It's the computational equivalent of having to pick six numbers at random out of a hat and see if they are a match with a number that will earn Bitcoins. A user mining on an individual PC is unlikely to win, just as someone buying a single lottery ticket is unlikely to win the jackpot. The best way to acquire Bitcoin is to join a mining pool that shares its proceeds, much like co-workers pool their resources to buy a large number of lottery tickets, dividing any potential winnings. To find illicit Bitcoin mining operations, researchers consulted public repositories of malware providers. They also contacted several people who run Bitcoin mining pools. Computer scientists expected malware operators to hide their mining activities behind proxies. Instead, they found that operators often were mining in the open and joining public mining pools. Mining in public pools makes malware operators more visible, where their large computational resources stand out. But pool operators rarely call them out, fearing reprisals, mostly in the form of denial of service attacks. Law enforcement would be less hesitant, Snoeren pointed out. "This could be the equivalent of tax evasion for Al Capone," he said.INFORMATION: The study was funded in part by the National Science Foundation.

[Attachments] See images for this press release:
Using stolen computer processing cycles to mine Bitcoin Using stolen computer processing cycles to mine Bitcoin 2

ELSE PRESS RELEASES FROM THIS DATE:

Strawberries lower cholesterol

Strawberries lower cholesterol
2014-02-25
A team of volunteers ate half a kilo of strawberries a day for a month to see whether it altered their blood parameters in any way. At the end of this unusual treatment, their levels of bad cholesterol and triglycerides reduced significantly, according to the analyses conducted by Italian and Spanish scientists. Several studies had already demonstrated the antioxidant capacity of strawberries, but now researchers from the Università Politecnica delle Marche (UNIVPM, Italy), together with colleagues from the Universities of Salamanca, Granada and Seville (Spain), conducted ...

The importance of (experimental) design

The importance of (experimental) design
2014-02-25
There are clear advantages to living in cities: safety, ready availability of infrastructure, plenty of company etc. Nevertheless, a large number of people eschew them for the benefits of country life, such as clean air and lots of space. Many species of animals, and particularly birds, face the same choice between living in large groups or remaining in smaller ones, thereby avoiding disadvantages of larger colonies such as the increased risk of disease and increased aggression from neighbours. What causes different individuals of a particular species to take the decisions ...

New study finds concussion-related health problems in retired football players

New study finds concussion-related health problems in retired football players
2014-02-25
New Rochelle, NY, February 25, 2014—Repeated concussions and mild brain trauma can result in reduced levels of growth hormone, gonadotropin, and thyroid hormones, causing disorders such as metabolic syndrome and erectile dysfunction and overall poor quality of life. The results of a new study of retired professional football players that compares number of concussions sustained during their careers and health problems associated with hormonal deficiency is published in Journal of Neurotrauma, a peer-reviewed journal from Mary Ann Liebert, Inc., publishers. The article is ...

Mother to child HIV transmission at record low in the UK

2014-02-25
The rate of mother to child HIV transmission is at an all-time low in the UK, according to a paper published today in the journal AIDS. The study examined over 12 000 pregnancies in women diagnosed with HIV before or during pregnancy and delivered in 2000-2011; there was a four-fold drop in the rate of mother to child transmissions, from 2.1% in 2000-2001 to 0.46% in 2010-2011. Dr Claire Townsend (UCL Institute of Child Health) said: "Mother to child HIV transmission is now at the lowest level ever in the UK & Ireland, and as far as we're aware such low levels have ...

System that automatically fills gaps in programmers' code gains power

2014-02-25
Since he was a graduate student, Armando Solar-Lezama, an associate professor in MIT's Department of Electrical Engineering and Computer Science, has been working on a programming language called Sketch, which allows programmers to simply omit some of the computational details of their code. Sketch then automatically fills in the gaps. If it's fleshed out and made more user-friendly, Sketch could ultimately make life easier for software developers. But in the meantime, it's proving its worth as the basis for other tools that exploit the mechanics of "program synthesis," ...

NASA's SDO shows images of significant solar flare

NASAs SDO shows images of significant solar flare
2014-02-25
The sun emitted a significant solar flare, peaking at 7:49 p.m. EST on Feb. 24, 2014. NASA's Solar Dynamics Observatory, which keeps a constant watch on the sun, captured images of the event. Solar flares are powerful bursts of radiation, appearing as giant flashes of light in the SDO images. Harmful radiation from a flare cannot pass through Earth's atmosphere to physically affect humans on the ground, however -- when intense enough -- they can disturb the atmosphere in the layer where GPS and communications signals travel. To see how this event may impact Earth, please ...

Scientists explore promising new option for first line of attack in lymphoma

2014-02-25
A study led by Manchester scientists has shown promising results for a new treatment approach in follicular lymphoma. Follicular lymphoma is a type of non-Hodgkin's lymphoma– a blood cancer - that usually develops slowly. The majority of patients are diagnosed when their disease is at an advanced stage. Recent improvements in treatment have included the use of antibodies to specifically target the tumour cells and to stimulate the patient's own immune system to attack their tumour. The use of such antibodies has improved treatment response, but unfortunately most patients ...

Tumors 'light up' with new, unique imaging system using scorpion venom protein and a laser

2014-02-25
LOS ANGELES (Feb. 24, 2014) – Researchers at the Cedars-Sinai Maxine Dunitz Neurosurgical Institute and Department of Neurosurgery have developed a unique, compact, relatively inexpensive imaging device to "light up" malignant brain tumors and other cancers. The experimental system consists of a special camera designed and developed at Cedars-Sinai and a new, targeted imaging agent based on a synthetic version of a small protein – a peptide – found in the venom of the deathstalker scorpion. The imaging agent, Tumor Paint BLZ-100, a product of Blaze Bioscience Inc., homes ...

Real time forecast of Hurricane Sandy had track and intensity accuracy

2014-02-25
A real-time hurricane analysis and prediction system that effectively incorporates airborne Doppler radar information may accurately track the path, intensity and wind force in a hurricane, according to Penn State meteorologists. This system can also identify the sources of forecast uncertainty. "For this particular study aircraft-based Doppler radar information was ingested into the system," said Fuqing Zhang, professor of meteorology, Penn State. "Our predictions were comparable to or better than those made by operational global models." Zhang and Erin B. Munsell, ...

The only top 10 cancer where survival rates are falling

2014-02-25
Of the top 10 cancers in the UK, bladder cancer is only one where survival rates have been shown to be getting worse. New figures published this month in the Journal of Clinical Urology confirm in a study of cases of bladder cancer in England over a 19 year period (from 1990 until 2009) that survival rates here in the UK are falling and are worse than in than in other European countries with similar incidence rates. Shockingly, bladder cancer isn't a rare cancer that only affects a few people every year. In fact, bladder cancer is our 7th most common cancer (the 4th most ...

LAST 30 PRESS RELEASES:

Scientists unlock secrets behind flowering of the king of fruits

Texas A&M researchers illuminate the mysteries of icy ocean worlds

Prosthetic material could help reduce infections from intravenous catheters

Can the heart heal itself? New study says it can

Microscopic discovery in cancer cells could have a big impact

Rice researchers take ‘significant leap forward’ with quantum simulation of molecular electron transfer

Breakthrough new material brings affordable, sustainable future within grasp

How everyday activities inside your home can generate energy

Inequality weakens local governance and public satisfaction, study finds

Uncovering key molecular factors behind malaria’s deadliest strain

UC Davis researchers help decode the cause of aggressive breast cancer in women of color

Researchers discovered replication hubs for human norovirus

SNU researchers develop the world’s most sensitive flexible strain sensor

Tiny, wireless antennas use light to monitor cellular communication

Neutrality has played a pivotal, but under-examined, role in international relations, new research shows

Study reveals right whales live 130 years — or more

Researchers reveal how human eyelashes promote water drainage

Pollinators most vulnerable to rising global temperatures are flies, study shows

DFG to fund eight new research units

Modern AI systems have achieved Turing's vision, but not exactly how he hoped

Quantum walk computing unlocks new potential in quantum science and technology

Construction materials and household items are a part of a long-term carbon sink called the “technosphere”

First demonstration of quantum teleportation over busy Internet cables

Disparities and gaps in breast cancer screening for women ages 40 to 49

US tobacco 21 policies and potential mortality reductions by state

AI-driven approach reveals hidden hazards of chemical mixtures in rivers

Older age linked to increased complications after breast reconstruction

ESA and NASA satellites deliver first joint picture of Greenland Ice Sheet melting

Early detection model for pancreatic necrosis improves patient outcomes

Poor vascular health accelerates brain ageing

[Press-News.org] Using stolen computer processing cycles to mine Bitcoin
Who does it and how much do they make?