Skip to main content

How Bitcoin Botnet Mining Works

Distributing Bitcoin miner using RAT Botnet


Botnet could be a RAT (remote administration tool) that the hacker spread over the internet by encrypting it and making it FUD (Fully Undetectable) by anti viruses, he can later bind it with any crack or software, and it will become a danger treat, that's why people should not download Crack/keygen or any related applications, for the sake of not only the economy but their security.

A Bitcoin miner is a small command line application that use your processor or GPU to generate Bitcoin hashes then send them to the hacker or a mining pool, a mining pool is a tiny network for the mining bots to join force and generate hashes in a mass form.

After the hacker or the botmaster spread his botnets or trojans over the the internet, getting hundreds of victims (zombie computer) he will later order them all to download and run the Bitcoin mining application passing his username and password for his pool, the victim machines will start generating hashes and making digital currency "Bitcoin" for the Botmaster, the victim computers will be running slow or worst crash, the process of mining usually takes 100% of the CPU or GPU.

There is no way to avoid this but to install a good Firewall like COMODO, and monitor all the traffic, also keeping an eye on any suspected application that runs 100% of your processor.

many people don't care or don't notice the slowness of their machines or they just format it without knowing the reason.

Bitcoin is still not popular or understandable by normal users, most don't even know what is peer-to-peer networks, so how they are spouse to understand peer-to-peer money.

Comments

Popular posts from this blog

Best Web Hosting Hosting Ever - HostMonster.com

You all know HostMonster.com, they are known for the power of their services and up-time, the big storage and more, but now they got even better the holy "UNLIMITED EVERYTHING".
and yes do trust them.
Guess how much : 5.95 a month

Hosting Features:
Disk Storage Unlimited
Host UNLIMITED DOMAINS
Free Domain Name
Free Drag and Drop Site Builder
Support International Domain Names
POP3/POP3 Secure Email Support Unlimited
IMAP/Secure IMAP Email Support Unlimited
Gigs of Site Transfer Unlimited
Forwarding Email Accounts Unlimited
Email Autoresponder Unlimited
Add-on Domains Unlimited
Parked Domains Unlimited
Subdomains Unlimited
Additional FTP Accounts Unlimited
MySQL Databases 100
PostgreSQL Databases 100
IMAP/secure IMAP Email Support
3 Different Web Based Email Solutions
CGI-BIN
CGI Library
Server Side Includes
Frontpage 2000/2002 Extensions
Account "Control Panel"
FTP Access
Shell Access (SSH)
Override .htaccess Support
Anonymous …

Tria Mera - 666 - The truth

Following is a reference to the movie white noise, what you see on this page is not my opinion, and I am not interested on this stuff, if you come here than you are probably searching after watching the movie or researching tria mera term, this is for educational purposes only.



The expression, Third Day, appears in several narratives in the Bible. (Occasionally, it is “three days.”) Some biblical interpreters have thought that some of these third day motifs have significance by signifying a certain divine principle, and a few interpreters have thought that they are cryptic in meaning. Why? Interestingly, these narratives record some of the most important events in the history of Israel. And surprisingly, except for the Bible’s mention of the third day, the seventh day, and its account of creation in Genesis 1, the Bible rarely mentions the other days of the week.
The Number of the Beast is described in the Book of Revelation 13:18. From the King James translation:[5]
Here is wisdom. L…

Hacking With Google, Spy Cams

This is a quick post since I have to sleep and feel so tired ...
by searching for one of these strings on google :
inurl:ViewerFrame?Mode="
inurl:MUltiCameraFrame:?Mode="
inurl:view/index.shtml"
inurl:axis-cgi/mjpg"
inurl:ViewerFrame?Mode="
inurl:MultiCameraFrame:?Mode="
You will be able to view other people webcams, not everyone, but everyone that have a cam can be viewed on any browser by writing the ip address with the pc connected to it, and indexed by Google since you can access that on port 80 or 8080 ...


Some examples ready to go "it took forever to list them here" :
http://210.155.197.108/ViewerFrame?Mode=Motion&Language=1
http://shiretoko.miemasu.net/ViewerFrame?Mode=Motion&Language=1
http://219.166.247.165/ViewerFrame?Mode=Motion&Language=1
http://208.0.229.84/ViewerFrame?Mode=Motion&Language=0
http://220.254.98.19/ViewerFrame?Mode=Motion&Language=1
http://vhshop.cmauto.com:8002/ViewerFrame?Mode=Motion&Language=0
ht…