Cryptocurrency miners now possess process-killing function to kill processes which consumes the CPU processing power.
Since majority of cyber-attackers are now focused on cryptocurrency, every device that has computing power is now a target of malware propagation. Different kinds and methods of cryptocurrency-mining emerged such as smartphone miners, NSA tool-powered miners, and even nuclear facility miners. All these schemes are effective in their own ways, and are gradually making innovations through time.
Recently, it was discovered that newly-engineered crypto-mining malware have the capability to kill processes that consume the computing power of the target system. Included in the code of the crypto-mining malware is a kill list consisting of processes that might hinder the mining process consumption. The list includes some Operating system processes, as well as known processes from other cryptocurrency-miners to ace the competition.
The following is the list of some of the processes included in the kill list:
Although the process-killing capability of the crypto-mining malware will make the miner more effective, the function is quite advantageous to the infected system. Primarily, the malware is easily detectable since it is noticeable that some windows processes are terminated without the user interaction. Second, security researches can utilize the same code used in the malware to develop defensive applications which can auto-kill processes coming from crypto-mining malware.