Earn Bitcoin Scam — WHAT IS IT + How to Remove
THREAT REMOVAL

Earn Bitcoin Scam — WHAT IS IT + How to Remove

This article has been created in order to explain to you what is the Earn Bitcoin Scam and how you can remove them as well as all potentially unwanted programs delivered through them.

The Earn Bitcoin Scam is a popular malware tactic that attempts to manipulate computer users into infecting themselves with viruses. At the moment we do not have information about the perpetrators behind it. Our article gives an in-depth explanation of how it propagates and how victims can attempt to remove active infections.

Threat Summary

NameEarn Bitcoin Scam
TypePhishing email scam
Short DescriptionThe Earn Bitcoin Scam is a recent example of the scam tactic that extorts the targets into interacting with a scam site.
SymptomsVictims will receive email messages that contain the phishing instructions.
Distribution MethodPhishing emails.
Detection Tool See If Your System Has Been Affected by Earn Bitcoin Scam

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Earn Bitcoin Scam.

Earn Bitcoin Scam – Distribution Ways

This particular Earn Bitcoin Scam is being spread using a targeted campaign designed to trick the victims into downloading a software called Bitcoin Collector. They are led to believe that by using it they can generate free Bitcoins easily. At this moment the main method used by the criminal collective is the crafting of malicious phishing sites that focus heavily on search engine optimization. They contain design elements and are hosted on safe sounding domain names with the intent of manipulating the visitors into believing that this is a legitimate way of acquiring the cryptocurrency.

The users can be redirected to the site via referrals by the site or via messages received in social networks. One of the clever tactics employed by the the hackers behind this scam is the ability to generate referral links that will manipulate the visitors into thinking that they can earn more by sending it to their friends.

The visitors will be lead to a download page and instructions on how and why to download a program called Bitcoin Collector, the hackers also include a VirusTotal link claiming it to be a safe application.

We anticipate that other distribution techniques can be used as well, common ones are the following:

  • Malware Documents — The hackers can embed virus installation scripts into the most popular document format types: presentations, rich text documents, spreadsheets and databases. When they are opened by the victims a notification prompt will spawn asking for permissions to run the built-in scripts, this will trigger the program installation.
  • Application Installers — The criminals may also craft malware setup files of popular applications which are commonly installed by end users.
  • Browser Hijackers — The hackers may also create dangerous browser plugins which are alternatively known as “hijackers” and seek to make the users think that they are downloading a legitimate and useful browser extension. These hijackers are widely spread on the relevant repositories of the most popular web browsers: This is done with fake user reviews and developer credentials an elaborate descriptions.

The end goal of the hackers is to trick the recipients into downloading an archive, extracting it to a folder and launching the end malware called “Bot Collector”.

Earn Bitcoin Scam – In-Depth Overview

As soon as the computer users fall victim to the Earn Bitcoin Scam and start the “Bot Collector” program they will see an application window called “Freebitco.in – Bot” which appears inactive during most of the time. However as soon as it is launched it launch a malware payload, in the case of the analyzed samples a Trojan module. This means that the the virus instance will establish a secure connection with a hacker-controlled server allowing the criminals to spy on the victims, steal their files and deploy other threats.

An alternative behavior pattern is to deploy a ransomware infection — this is done by processing user data according to a built-in list of target file type extensions. The affected data may be renamed with a certain extension and a ransom note will be crafted in order to blackmail the victims into paying the criminals a decryption fee.

Related:
What is the .Marozka files virus? What is the Marozka ransomware? Can files encrypted by .Marozka files virus be recovered?
What Is .Marozka Files Virus – Remove It

Other consequences which can happen to the victims include malicious behavior such as the following:

  • Data Retrieval — The Earn Bitcoin Scam and the associated malware code and programs can be used to hijack sensitive information which can be used both to identify the victims and create an unique ID that can be assigned to each infected host.
  • Windows Registry Modifications — The engine can create new strings for the infection or modify existing ones. This can lead to serious performance issues, data loss and unexpected errors.
  • Boot Options — In certain situations the hackers may also make the scripts to automatically start as soon as the computer is powered on. This can also be used to make it more difficult to remove the active infections by blocking access to the boot recovery options.

We advice that all users remove the malware associated with the Earn Bitcoin Scam to protect their computers from further damage.

Remove Earn Bitcoin Scam from Windows and Your Browser

If you want to remove the Earn Bitcoin Scam from your computer, we strongly suggest that you follow the removal instructions posted underneath this article. They have been created with the main idea In mind to help you delete this virus either manually or automatically. Be advised that according to experts the best way to try and remove the software that is causing the Earn Bitcoin Scamming pop-ups is to use an advanced anti-malware software. Such program is created with the idea in mind to fully scan your computer and try to eliminate any traces of unwanted programs while protecting your computer against future infections as well.

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...