Here's one good reason why you should never use pirated software

Image credit: Shutterstock

Researchers from the IT security firm ESET have discovered a new cross-platform cryptocurrency miner called LoudMiner that comes bundled alongside pirated software.

Through the use of virtualization software, Quick Emulator (QEMU) on macOS and VirtualBox on Windows, LoudMiner is able to mine cryptocurrency on a Tiny Core Linux virtual machine.

Users' devices can become infected with the cryptocurrency miner by downloading pirated copies of a type of audio software plugin interface called Virtual Studio Technology (VST). Once infected, LoudMiner then uses the compromised machines to mine cryptocurrency and the miner even has the ability to self-update through the use of Secure File Copy (SCP) with an embedded username and private SSH key.

LoudMiner

Senior malware researcher at ESET, Marc-Etienne M. Léveillé explained why LoudMiner targets systems running audio software, saying:

“LoudMiner targets audio applications, given the machines running these applications often have a higher processing power. These applications are typically complex and have a high CPU consumption, so users will not find this activity unusual. Using virtual machines instead of another leaner solution is quite remarkable, and is not something we have typically seen before.”

ESET has observed that LoudMiner has been in use since August 2018 and the firm recommends that users avoid downloading pirated copies of commercial software to protect themselves.

ESET also recommends that users should beware of popups from unexpected “additional” installers, higher CPU consumption, as well as new services and connections from curious domain names.

For more details on LoudMiner, you can read ESET's LoudMiner: Cross-platform mining in cracked VST software report.

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off