IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

HiddenMiner cryptocurrency mining malware can push Android devices to breaking point

The stealthy Android malware could potentially cause phones of overheat

Android smartphones are facing yet another variation of cryptocurrency mining malware that can potentially cause a device to fail through overheating.

Dubbed HiddenMiner, the malware was discovered by cyber security firm Trend Micro, which noted it siphons a phone's CPU power to crunch calculations to generate the Monero cryptocurrency. 

Commonly known as 'cryptojacking', the malware can force a processor to run at maximum speed for extended amounts of time. This, in turn, can cause the phone's chipset to overheat and fail, or in the worst case scenario combust.  

So far it has been found in third-party marketplaces restricted to India and China and has not been detected in Google's official Play Store.

The code for HiddenMiner doesn't have a switch, controller or optimiser which means it will continuously mine for Monero until the device is completely drained or it overheats and fails.

It poses as a legitimate update for Google Play's app, cropping up as a message with the Google Play icon and com.google.android.provider.

Users that have an infected device will find this message popping up repeatedly until it is granted administrative access.

It has several ways it can hide within the app, most commonly by removing the label from the app and leaving a blank square, and once it has access, it will vanish altogether.

If it is granted admin privileges, users will not be able to uninstall the app until the admin privileges are revoked, but the malware will prevent users from doing so by locking the screen when they attempt to do so.

"HiddenMiner is yet another example of how cybercriminals are riding the cryptocurrency mining wave. For users and businesses, this reinforces the importance of practicing mobile security hygiene: download only from official app marketplaces, regularly update the device's OS (or ask the original equipment manufacturer for their availability), and be more prudent with the permissions you grant to applications," said Lorin Wu, mobile threats analyst at Trend Micro.

This type of malware is by no means new and Google had previously resolved this issue in Nougat and later in OS versions by reducing privileges of device admin apps.

So if you have a Nougat device, or later Android version, you'll simply be able to revoke permissions, but if you have an older device you'll need to reset it to remove HiddenMiner.

The malware is similar in nature to the Loapi Trojan malware that made headlines last year after it caused batteries to swell and potentially explode.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
The top programming languages you need to learn for 2022
Careers & training

The top programming languages you need to learn for 2022

23 Jun 2022