Warning! JavaScript is turned off or disabled! Some features on this website will not work.
Previous Next

Beware of "Black Theme for Whatsapp Web" CPU-Hijacking Bitcoin Miner Applications

2017-11-08T23:26:09 -  +
Beware of "Black Theme for Whatsapp Web" CPU-Hijacking Bitcoin Miner Applications

Whatsapp users, be careful of malicious CPU-Hijacking Bitcoin Miner web browser extensions and apps disguised as "Black Theme for Whatsapp Web." The malicious applications will slow down your computer or mobile device to a crawl. This makes it impossible for the infected device to function properly and will drain the battery very quickly because of the high CPU usage.


A CPU-Hijacking Bitcoin Miner called BlackWhats

 BlackWhats - Black Theme for Whatsapp Web

Black Theme for Whatsapp Web - BlackWhats - Black theme for Whatsapp Web ™

The malicious BitCoin Miner application is known as "Application.BitCoinMiner" to antivirus software makers, is a program that uses the computer's physical resources (memory, processing power, etc) to generate units of a virtual or digital cryptocurrency. It can make your PC or mobile device run slower than usual. When it is activated the infected device's CPU load goes up to 100%, which slows down everything else because all the CPU processing power is used up.

It may also do the following:

  • Displaying pop-up ads.
  • Hijacking your browser.
  • Inserting ads into the web pages, redirect your browser search, collect your personal information and sell it for advertising.

Here is a list of CPU-Hijacking Bitcoin Miner applications by the names given to them by antivirus software makers:

  • Application.BitCoinMiner.UB
  • Tool.BtcMine.1100
  • PUA.JScoinminer
  • BitCoinMiner,
  • Application.BitCoinMiner.SX
  • JS:Application.BitCoinMiner.TW
  • Application.BitCoinMiner.[variant],
  • JS:Application.BitCoinMiner.[variant]

About cryptocurrency

A cryptocurrency is an anonymous, decentralized form of digital currency, which can be used online as a medium of exchange much like traditional, physical currencies. Multiple cryptocurrencies exist, such as BitCoin, Ethereum, and Monero.

The 'crypto' part of the term refers to the use of cryptography both for creating the currency units and for securing transactions made with the units. Because of the anonymity provided by cryptocurrency, its legality and acceptance varies considerably between countries.

About cryptocurrency mining

Cryptocurrency units can be created by any user with specialized mining programs or miners that run the mathematical calculations needed to generate a unit of a particular cryptocurrency.

Because the calculations are complex, many enthusiasts will build computers with specialized hardware and software to handle the work. Some websites also support cloud mining, where users visiting the site essentially allow temporary use of their computer's processing power to perform part of the calculating work, usually in exchange for a service offered by the site.

Some malware includes miners as part of their payload; in such cases, the malware is hijacking a user's computer to create cryptocurrency units for the malware author's benefit.

Most antivirus software are able to remove most malicious CPU-Hijacking Bitcoin Miner, therefore, victims of these applications should scan their computers or mobile devices with the antivirus software installed on them.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

Remember to help us, help you, by donating. 🎁Click here to donate

Comments, Questions and Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. And, when you post a comment or review, we will use your IP address to display your approximate location to other users.

 Show More Comments (0)
Write Your Comment, Question or Review
Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.