Transaction: 926c8a2e5a480caa7cba890505393bd3f298c4a2

Included in block 20,698,802 at 2018/03/15 14:13:42 (UTC).

Transaction overview

Loading...
Transaction info
transaction_id 926c8a2e5a480caa7cba890505393bd3f298c4a2
ref_block_num 54,942
block_num20,698,802
ref_block_prefix 867,436,863
expiration2018/03/15T14:23:36
transaction_num 11
extensions[]
signatures 2008071b5d1fb5902d5e5d2855ef48ad28bb8c509192d7c2694691a3dbee9bac9209cdb73ad05b26c9a2a8da1f467e9efbad860e7b1aecf4bc9d182523468e637f
operations
comment
"parent_author":"",<br>"parent_permlink":"crypto",<br>"author":"crypto-post",<br>"permlink":"crypto-news-thousands-of-android-devices-infected-with-bitcoin-virus-malware-562f51672092d",<br>"title":"Crypto News - \"Thousands of Android Devices Infected with Bitcoin Virus Malware\"",<br>"body":"https:\/\/img.esteem.ws\/k8k4hg37rl.jpg\nEpidemic Cryptojacking not only appears on PC,<br> but also to Android phones and smart TV,<br> as found by researchers at Netlab360.\n\nAccording to researchers at the cyber security company,<br> there are hackers who attack thousands of Android phones and smart television sets to turn them into popular crypto currency miners such as Bitcoin and Monero.\n\nThere are at least 7000 infected devices in China,<br> which makes all the devices incorporated into a network that combines all of its computing power to mine Monero,<br> as quoted from Zdnet.\n\n https:\/\/img.esteem.ws\/8hho1edwks.jpg\n\nAlthough the current number of victims is still very little,<br> according to cyber security experts,<br> will be more and more hackers who use this method. That is looking for additional money by using resources such as computers,<br> phones,<br> tablets and other devices owned by its victims,<br> without the need to spend to buy the device or pay for internet access.\n\n https:\/\/img.esteem.ws\/bgt7kaiiat.jpg\n\nAccording to Netlab360,<br> this attack exploits open ports in the operating system that make these devices can communicate on the internet. The port in question is port 5555,<br> which hackers use to search for Android phones and unprotected smart TV.\n\nThen the devices are infected with malware,<br> and keep looking for other devices to expand the network of its victims. Google itself has not commented about the malware OS that attacked the homemade OS.\n\n<hr>\n\n<center>\n#### PLEASE SUPPORT ME\n\n### FOLLOW \ud83c\uddf5\ud83c\uddf1 UPVOTE \ud83c\uddf5\ud83c\uddf1 REBLOG\n\n#### \u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25abTHANK YOU\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\u25ab\n<hr>",<br>"json_metadata":" \"links\":[ ,<br>\"image\":[\"https:\/\/img.esteem.ws\/k8k4hg37rl.jpg\",<br>\"https:\/\/img.esteem.ws\/8hho1edwks.jpg\",<br>\"https:\/\/img.esteem.ws\/bgt7kaiiat.jpg\" ,<br>\"tags\":[\"crypto\",<br>\"cryto-news\",<br>\"cryptocurrency\",<br>\"bitcoin\",<br>\"esteem\" ,<br>\"app\":\"esteem\/1.5.1\",<br>\"format\":\"markdown+html\",<br>\"community\":\"esteem\" "
* The API used to generate this page is provided by @steemchiller.