A cryptocurrency botnet is continuing to spread amongst unprotected machines – and the software has even spread by hiding in innocent looking files such as images of Taylor Swift. Once a system is infected, a percentage of its CPU resources are then dedicated to mining the privacy cryptocurrency known as Monero. Unlike other cryptocurrencies such as Bitcoin, Monero mining can only be done with a CPU. And while each victim machine may only generate a few pennies worth of the cryptocurrency each day, the entire botnet itself is estimated to have earned its creators over $3 million since 2016.

For those unfamiliar, a botnet is when a virus or similar software takes control over a large number of computers around the world by exploiting vulnerabilities in an operating system or software. The person controlling the botnet can then use it to earn an illicit profit such as by renting it out for distributed denial of service or DDOS attacks, or in this case, from mining cryptocurrency for a direct profit. This botnet ensures that it’s infected hosts only use a portion of their CPU for illicit purposes so as to reduce the chance that the software will be detected.

The cryptocurrency that this network mines, Monero, became famous for its extremely anonymous nature. This makes it almost impossible for authorities to track down who is responsible for the botnet and is profiting from it.

How To Protect Yourself From Cryptocurrency Botnets

The good news is that this type of botnet typically only works against what the research firm Sophos calls “low-hanging fruit” – meaning computers that are running outdated operating systems and that don’t have antivirus protection. This particular botnet seems to exclusively target Windows machines, with a special preference for those running SQL servers. That means a lot of the victims may not be individuals and their personal computers, but instead could be back end machines that a small company runs but doesn’t keep up to date.

This botnet also has the highest number of victims in mainland China, a country that is still widely using Windows XP – an operating system that is no longer receiving critical security updates. About 6% of the victims of the botnet are based in the United States.

To protect yourself from this kind of attack, the first thing you’ll need to do is to run an up-to-date operating system and regularly download security patches as they are released. This is especially true if you are using an SQL server or other software that regularly reaches out to the Internet or a local network. Lastly, for Windows users it is imperative that you run some type of antivirus software on your machine and also keep it up-to-date. With these measures in place, you should be immune to the vast majority of attacks of this type.

Next: Facebook Leaked 267 Million Phone Numbers, User Data