Crypto-Loot Miner
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 27 |
First Seen: | October 13, 2017 |
Last Seen: | June 25, 2022 |
OS(es) Affected: | Windows |
The Crypto-Loot Miner program is a JavaScript-based application that is promoted as an alternative to the Coin-Hive.com CPU Miner we mentioned in our article about the SafeBrowse Chrome Extension by Safebrowse.co. Both apps are written on JavaScript and are intended to be implemented on Web pages that users tend to keep open for a prolonged period. The Crypto-Loot Miner and the Coin-Hive Miner are supposed to be planted on Web pages and use the Web surfers processing power to mine Bitcoin, Monero, Digicoin, Litecoind and other digital currencies based on the blockchain technology. That way site owners can earn money and keep their site ad-free. As you may know, keeping a site operational requires paying for server maintenance, staff, insurance and all kinds of bills. Since the beginning of the Internet, pages incorporate advertisements, promotions, and discounts of all kinds to stay afloat.
More than two decades after the Internet has managed to reach the four corners of the world the Internet from today is very different and digital currencies are forces that change the world in an unpredictable direction. Threat authors, legitimate software developers, and regular PCs use tools like the Crypto-Loot Miner to earn money using processing power under their control. The Crypto-Loot Miner program is not classified as bad or good since it can be incorporated in sites with and without the knowledge of the site owners. Moreover, the real-world laws are not keeping up with the blockchain development and mining software published online. Many countries lack the legislation to determine if it is acceptable for a site to use the visitor's processing power and earn money. The Crypto-Loot Miner is programmed to use 50% of the free CPU power whenever a visitor loads a page that has the Crypto-Loot JavaScript embedded. You can read more on the Crypto-Loot Miner on its official page at Crypto-loot.com. Web surfers who are not fond of advertisements on their favorite pages may be willing to "donate" some of their processing power for the time they spent online and help the site owners keep the portal operational. The Crypto-Loot Miner is classified as a Potentially Unwanted Program (PUP) at the time of writing.