Threat Database Trojans Shadowsocks Miner Trojan

Shadowsocks Miner Trojan

By GoldSparrow in Trojans

Threat Scorecard

Ranking: 9,901
Threat Level: 90 % (High)
Infected Computers: 442
First Seen: October 10, 2017
Last Seen: September 17, 2023
OS(es) Affected: Windows

The Shadowsocks Miner Trojan is a detection name given to a program that is used for mining digital crypto-currencies like Monero, Dashcoin, DarkNetCoin and others. The Shadowsocks Miner Trojan is a CPU reliant miner that is very similar to the Moloko CPU Miner and the Gplyra Miner that we covered earlier in 2017. The Shadowsocks Miner Trojan is a threat that was discovered on October 10th, 2017. Computer security researchers alert that the Shadowsocks CPU Miner may be deployed to systems via software bundles and manual hacking of targeted computers. The Shadowsocks Miner Trojan is observed to hijack a little more than 70% of the compromised system's resources for its needs. PC users may notice clues that point to an infection with the Shadowsocks Miner Trojan that include:

  • The window resizing may be slow.
  • The games may not run smoothly.
  • The videos may stutter and open slower.
  • Yje program launching may be delayed.

You may be interested to know that the Shadowsocks Miner Trojan appears to be using a modified copy of the Shadowsocks open-source proxy service for its network communications. Hence, the creator of the Shadowsocks Miner Trojan can hide the source of commands to the Trojan. Researchers reported that the Shadowsocks Miner Trojan might be listed as 'Websock.exe' in the Task Manager and feature the description 'CPU Utility.' Soon after 'Websock.exe' is loaded, users may notice a second process dubbed 'Service.exe,' which has the description 'taskxmr.' Both processes are connected to the Shadowsocks Miner Trojan and serve as a communication module and the engine that handles the digital mining operations.

The rise in prices for Bitcoin and other digital currencies, as well as the expanding support for digital payments recorded from February 2017 to September 2017, may explain why we are seeing many new Trojan miners on the threat landscape. It is not surprising that threat creators may seek to take advantage of the modern day "Gold fever" and use spam emails, zero-day exploits and fake software updates to spread programs like the Shadowsocks Miner Trojan. It is recommended that PC users employ the services of a reputable anti-malware solution that can prevent Trojan miners from hijacking your system resources for the benefit of Black Hat hackers.

Trending

Most Viewed

Loading...