Tuesday, March 4, 2025
HomeCryptocurrency hackHiddenminer - Android Monero Mining Malware Can Overheat and Cause Device Failure

Hiddenminer – Android Monero Mining Malware Can Overheat and Cause Device Failure

Published on

SIEM as a Service

Follow Us on Google News

A new Monero Mining Android malware dubbed ANDROIDOS_HIDDENMINER that uses the device CPU power to mine Monero malware and could cause the device to overheat and potentially fail.

The Hiddenminer app posses like a legitimate Google Play update app and forces users to grant device administrator permission by deploying it in a continuous loop until user clicks activate button.

Hiddenminer - Android malware
Security researchers from Trend Micro discovered this Monero mining Android malware dubbed ANDROIDOS_HIDDENMINER. According to researchers “one of its operators withdrew 26 XMR (or US$5,360 as of March 26, 2018) from one of the wallets. This indicates a rather active campaign of using infected devices to mine cryptocurrency”.

Hiddenminer malware similar to the Loapi that generates a constant load that makes the battery bulged and damages the phone cover.

Once the malware gets required permission it starts mining process in the background and it has no switch in place, which means it continuously run’s the monero miner until the device resource exhausted.

As of now, it is found only in the third party Android market stores and it is targeting users in India and China. These third-party markets are open to everyone and there is one validation process.

Hidding techniques – HiddenMiner

Hiddenminer - Android malware

HiddenMiner employees stealthy techniques to hide in devices once it installed. It uses to empty the app label and shows transparent icon after installation which makes harder for users to detect.

“Once activated the device administrator, it will hide the app from the app launcher by calling setComponentEnableSetting(). Note that the malware will hide and automatically run with device administrator permission until the next device boot”, researchers said.

HiddenMiner also takes advantage of the Android bug that resolved in Nougat and later Android OSs. Before Nougat the device admin application is privileged to lock the screens.

So in HiddenMiner case, it is already running as admin application which lock’s user screen when they try to uninstall the app from the device.

Indicators of Compromise can be found in TrendMicro’s blog post.

Common tips to Catch Fake Android App

  • Look at the publish date.A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...