{"id":1577,"date":"2013-04-05T10:00:08","date_gmt":"2013-04-05T14:00:08","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1577"},"modified":"2020-02-26T18:56:28","modified_gmt":"2020-02-26T14:56:28","slug":"skype-trojan-steals-cpu-power","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/skype-trojan-steals-cpu-power\/1577\/","title":{"rendered":"A Skype Trojan steals your CPU power"},"content":{"rendered":"<p>Even cautious users might easily fall prey to cybercriminals when a malicious link comes from a friend via Skype. This trick is being used by the new Trojan, <a href=\"http:\/\/www.securelist.com\/en\/blog\/208194206\/An_avalanche_in_Skype\" target=\"_blank\" rel=\"noopener nofollow\">discovered by Kaspersky lab experts<\/a>.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Infection starts with a message from a friend, saying something like \u201cYour photo isn\u2019t really that great\u201d or \u201ci don\u2019t think i will ever sleep again after seeing this photo\u201d \u2013 virus varies the message. A provocative text is accompanied by a link that looks like http:\/\/goo.gl\/XXX?image=imgXXX.jpg or \u00a0<a href=\"http:\/\/bit.ly\/XXXX\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/bit.ly\/XXXX<\/a>.<\/p>\n<p style=\"text-align: center\"><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05114012\/skypevir-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1579 aligncenter\" alt=\"skype virus\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05114012\/skypevir-1.png\" width=\"510\" height=\"52\"><\/a><\/b><\/p>\n<p>If clicked, it leads to a website, which then downloads multiple malicious modules to the PC instead of showing any pictures. Besides traditional activity like password stealing, this piece of malware tries to use installed Skype to send malicious links to the unsuspecting victim\u2019s friends. Social engineering works really well in this case, and stats of the bit.ly and goo.gl URL shorteners reveal that those links receive about 12,000 clicks per hour!<\/p>\n<div class=\"pullquote\">If you\u2019ve received any suspicious links, try to ask your contact. Was it them, or is it just a virus?<\/div>\n<p>Most victims come from Russia, Italy, Ukraine, Poland, Costa Rica, China and Bulgaria. Don\u2019t be one of the victims \u2013 if you\u2019ve received any suspicious links, try to ask your contact. Was it them, or is it just a virus?<br>\nOne of the Trojan variations also installs a Bitcoin generator on the victim\u2019s computer. Bitcoin is a cryptography-based digital currency, which could be produced by anyone using a lot of computing\u00a0power. If your PC unexpectedly slowed down recently and you see some processes taking 90+ percent of CPU in the Task manager, it\u2019s time to check your PC with a <a href=\"https:\/\/www.kaspersky.com\/kaspersky_anti-virus\" target=\"_blank\" rel=\"noopener nofollow\">robust antivirus<\/a>.<\/p>\n<p>There is some good news as well \u2013 users of <a href=\"https:\/\/www.kaspersky.com\/kaspersky_internet_security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> are safe thanks to KSN cloud protection.<\/p>\n<p>In-depth analysis of this malware by Dmitry Bestuzhev is available at <a href=\"http:\/\/www.securelist.com\/en\/blog\/208194210\/Skypemageddon_by_bitcoining\" target=\"_blank\" rel=\"noopener nofollow\">securelist.com<\/a>.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.<\/p>\n","protected":false},"author":32,"featured_media":1578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[374,345,241,145],"class_list":{"0":"post-1577","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-bitcoin","10":"tag-skype","11":"tag-trojan","12":"tag-virus"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/skype-trojan-steals-cpu-power\/638\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/skype-trojan-steals-cpu-power\/1577\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/skype-trojan-steals-cpu-power\/1577\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/bitcoin\/","name":"bitcoin"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1577"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1577\/revisions"}],"predecessor-version":[{"id":15503,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1577\/revisions\/15503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1578"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}