This Malware Could Be Using Your PC To Make Money

If you haven’t heard of a malware strain called Crackonosh, be aware that it might be abusing your system, and specifically, Windows Safe Mode, to make money for its controllers.

In fact, since it was first discovered, researchers at Avast estimate that Crackonosh has quietly generated millions by enslaving PCs around the world and using them to mine cryptocurrency.

Crackonosh is only a few years old, having first been spotted in the wild back in June of 2018. It has spread like wildfire, leveraging the popularity of file sharing (torrent) websites where it piggybacks inside compressed files containing music, movies and cracked versions of in-demand software.

The malware’s design is fairly clever, and before it tries to install itself on a target system, it will scan for the presence of antivirus software running on the target machine, then attempting to disable it and delete Windows Defender. Once that’s done, Crackonosh takes the additional step of deleting the log file, essentially destroying the evidence of its misdeeds.

Finally, it deploys a cryptocurrency mining software called XMRig, utilizing your PC’s resources to mine Monero (XMR), and modifies the registry so that the machine reboots in Safe Mode. That is incredibly clever, because by design, when a computer boots up in Safe Mode, (which is used primarily for diagnostic purposes) only a minimal tool set loads, which doesn’t include antivirus software.

Based on Avast’s research, Crackonosh is infecting around a thousand machines each day, and so far, nearly a quarter of a million machines have been bent to the will of the group controlling Crackonosh. That amounts to a lot of Monero mining power. Estimates are that it has enabled them to mine more than 9000 XMR, which, based on current prices, amounts to more than two million dollars.

In any case, if you’re a fan of torrent sites, beware of Crackonosh. While not overtly harmful, it will allow hackers to steal your processing power and profit from it.

Some Netgear Devices May Have Vulnerabilities According To Microsoft

Do you use a Netgear DGN router, either at home or in your office? If so, be aware that Microsoft has discovered a number of security flaws that impact those devices, if they are running a firmware version older than V1.0.0.60.

Those vulnerabilities give attackers access to an unpatched router’s management page, which can be used to bypass whatever network security you may have in place and allow the attackers to derive saved router credentials via an accompanying side-channel attack.

In all, Microsoft unearthed three different security flaws, all rated serious to critical. If there’s a silver lining to be found in the discovery, it lies in the fact that Netgear has a fantastic track record when it comes to responding to discoveries like these. In fact, the company has already issued a patch for the firmware which addresses all three.

If you’ve already checked, and you’ve confirmed that you’re running a vulnerable version of the firmware, to get the patch, just head to Netgear’s support page. Once you’re there, start typing in the model number of your router in the search box on that page and a drop down list will appear with the company’s routers most likely to match what you’re typing.

When you see your model number, click it and it will direct you to the page for that model. If you happen not to see a drop down box, you may not have entered your model number correctly, or selected a product category.

In any case, once you’ve located your model and made your way to that page, you’ll see a “Downloads” link.

Click that and look for “Current Versions.” Beneath that, you’ll find a listing of firmware versions. Simply select the latest one available, download and install.

Kudos to Microsoft for their sharp eyes in spotting the trouble, and to Netflix for responding so quickly. Be safe out there.

Some US Mercedes Customers Likely Hit With Data Breach

Do you own, or have you recently test-driven a Mercedes? If so, or if you’ve created an account on their website for some other purpose, be advised that the company recently disclosed that they had been hacked.

They say that the attackers made off with personal and financial information belonging to more than 1.6 million account holders.

Based on the results of the investigation thus far, the company has confirmed that the stolen data included:

  • Customer Name (full names)
  • Physical address
  • Social Security Number
  • Date of Birth
  • Credit/Payment card number
  • Customer phone number
  • Email addresses
  • And specific information relating to the vehicle that each person purchased

Additionally, the hackers made off with a small number (less than a thousand) driver’s license numbers belonging to prospective buyers. That’s bad, as the compromised data is more than enough for the attackers to steal the identities of those people whose data they now possess.

As is the case in a growing number of data breaches, the issue wasn’t the Mercedes Benz network itself. Instead, the attackers gained access via a third party vendor vulnerability. A spokesman for Mercedes Benz said that the vendor in question had isolated the weak spot in their security and made changes so that it won’t happen again.

That’s small comfort, however, for the 1.6 million+ customers who now have to watch their credit reports like a hawk.

In any event, the company is in the process of contacting all those who were impacted by the breach, and as is common in these types of cases, Mercedes Benz is offering two years of free credit monitoring if your data was compromised. If you haven’t heard from the company by the time you read these words, odds are excellent that you weren’t impacted, but if you want to be sure, check the website “Have I Been Pwnd” just to be safe.

Windows 11 Might Change The Blue Screen Of Death

On the heels of Microsoft’s announcement of Windows 11, the Redmond Giant published an overview of the changes we can expect when the new OS rolls out. There’s a lot to like in what the company has told us so far.

One change, however, has largely escaped notice. Granted, it’s a small change, but when you see it, you’re sure to take note.

The infamous Blue Screen of Death is going away. No, that’s not completely accurate, it’s not so much going away as it is changing color. Once Windows 11 is released, when something goes catastrophically wrong, we’ll be treated to a Black Screen of Death, which somehow seems more appropriate, if not more ominous.

Microsoft has already begun testing various aspects of Windows 11, but the new Black Screen of Death hasn’t been fully enabled yet.

The Blue Screen of Death first appeared way back in Windows 3.0, and it hasn’t seen many changes since its introduction. In 2012, during a Windows 8 update, the company added a sad face to the screen, and in 2016, they incorporated QR codes. Both the sad face and the QR codes will remain for Windows 11. Only the color will change.

Microsoft hasn’t commented on the reasoning behind the small but ominous change, but theories abound. Mostly, the prevailing line of thought goes, it has to do with aesthetics. Microsoft is working hard to freshen up and modernize the look of their OS, and crisp, black screens are a bit of a departure for them.

Whatever the reason, if you’re an IT professional, you’ll still have a screen that provides the stop code and crash dump information. That will at least help you get started on a diagnosis when things go sideways.

Microsoft May Allow 7th Generation Intel CPU’s On Windows 11

Not long ago, Microsoft announced the development of Windows 11, which formally brought the Windows 10 era to a close. Details were sketchy of course, as is often the case with announcements like the one Microsoft made. However, over time, additional details have come to light.

Recently, for instance, the company announced that they were considering lowering the requirements for the Windows 11 OS. The minimum requirements initially published for Windows 11 would have excluded a number of CPU’s, even if that hardware would have no particular difficulty running the new OS. The company’s initial decision was such that only Intel 8th generation, AMD Zen 2, and Qualcomm 7 and 8 processors would be deemed compatible, which really narrowed the field.

Additionally, the company’s initial requirements mandated a TPM 2.0 security processor to even be able to install the new OS.

Needless to say, the company’s massive user base took a dim view of what they considered to be draconian requirements. The company found itself on the receiving end of a massive wave of negative feedback based on their decision. In light of that, the company began walking at least some of their prior statements back.

In a recent blog post, they say:

“As we release to Windows Insiders and partner with our OEMs, we will test to identify devices running on Intel 7th generation and AMD Zen 1 that may meet our principles.” “Based on the feedback so far, we acknowledge that it was not fully prepared to share the level of detail or accuracy you expected from us on why a Windows 10 PC doesn’t meet upgrade requirements.”

It’s fair to say that this drama is far from over. Microsoft is barely into the planning stages of the new OS, and we can expect lots of changes, some public, and others hidden or mostly hidden from view. One thing’s for sure though. The new OS is coming. We may not know exactly what form it will take yet, or what machines will run it, but it’s coming.