![]() ![]() This malware is obviously relatively sophisticated, judging by the number of nefarious functions it performs. We wish to stress that the software house which sells GraphicConverter is innocent and is as much a victim as the unscrupulous user who downloads the hooky version. In this instance its been found in image editing application GraphicConverter v7.4, but is sure to be embedded in more dodgy software, along with improved versions of it, eventually. The trojan unsurprisingly comes as a payload within pirate software downloaded from unofficial sources. A mid to high end GPU can actually outperform any general purpose CPU, no matter how fast, by several orders of magnitude, which is very important when performing any cryptographic functions that require a lot of processing power, hence this particular hijack. This is because the trojan harnesses the significant power available in today's GPU's to perform the Bitcoin mining. This adds a really distasteful twist, doesn't it?īut how does a hapless Mac user know that their machine is infected? One of the first signs is sluggish performance and possibly extra noise from the fan on the graphics card.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |