Ok I hate doing this, because I never want to ruin anything that may have potential but people need to be aware about what stuff is and what it could do.
DEV Please do not take this as an attack on your coin, just fix the problem so it does not exist, run a good productive coin that has a bright future without the risk of who knows how many users. I Have a friend who just got hacked from a situation just like this, got into his exchange account and everything. This stuff is real, please always be careful with new coins. Things like this can also keep you from being listed on good exchanges.
Yea it got worse too
https://www.virustotal.com/en/file/1ddb0bef8d7d9372d83da167581e66d6166153a35ef3237b7840146c5faf2177/analysis/1454794339/use with extreme caution.
I was looking to test it for staking for our site, but wont dare download this thing on our wallet server. You could give me 200,000,000 VAL and ill pass.
I do remember latium which ripped a lot of people off, stellar is not to bad it was a pretty neat coin. I made some good change on stellar.
the real; question is how the heck did you increase in the number of viruses found from Jan 30th to Feb 07th. thats weird.
Also why is it using Bitcoin addresses?
----------------------------------------------------------FIRST VIRUS---------------------------------------------------------
Risktool.Win64.Bitcoinminer (!c or any other addition)
When Trojan.BitcoinMiner is detected with a scan of Malwarebytes Anti-Malware your computer is infected with a Trojan horse. Once the Trojan.BitcoinMiner infected the target PC, it will use various ways to protect itself from being removed. This malware is designed by cybercriminals to use the GPU and CPU power to mine bitcoins on the infected system without your knowledge.
The presence of the trojan.bitcoinminer can significantly slow down your computer and is able to create a backdoor on the system to download other malicious programs into your computer. The infected computer can finally crash if the Trojan.BitcoinMiner is not completely removed.
The kind of malware (Trojan.BitcoinMiner) is detected by antivirus software under various names like the RiskTool.BitCoinMiner, Risktool.Win64.BitCoinminer, Win32.BitCoinMiner, Skodna.BitCoinMiner and ApplicUnsaf.Win32.BitCoinMiner. when the installed antivirus or other security software detects a variant of the Trojan.BitcoinMiner you can use the (Trojan.BitcoinMiner Removal Guide) below, all malware removal programs we recommend are completely free to use.
3 separate instances of this particular virus were found by virus total
Risktool.Win64.Bitcoinminer!c
RiskWare[RiskTool:not-a-virus]/Win64.BitCoinMiner
not-a-virus:RiskTool.Win64.BitCoinMiner.ain
Notice how the names are easily changed yet the same virus has 3 instances, this is so if a virus detector removes one it knows, there is a chance the others may remain. This is very malicious in its own intent, trying to cover up the name and changing it so detectors will not be able to remove it. the even more suspicious is the report on the 30th of january reported only 1 instance
not-a-virus:RiskTool.Win64.BitCoinMiner.aij
But then on feb 7th the system that picked up that instance picked up a new instance of the same virus
not-a-virus:RiskTool.Win64.BitCoinMiner.ain
the difference is only 1 letter the J from the first report was changed to a N in the current report
doesn't change the virus its still the same virus.
----------------------------------------------------------SECOND VIRUS---------------------------------------------------------
BehavesLike.Win32.Dropper.tc
BehavesLike.Win32.Dropper.th is a virus detected by Microsoft Windows and several Antivirus or Anti-Malware software vendors. This BehavesLike.Win32.Dropper.th threat is classified as PUP a Potentially Unwanted Program or PUA a Potentially Unwanted Programs because it inflicts and acts as a malicious threat into your Windows computer system.
BehavesLike.Win32.Dropper.th is adware which is bundled using custom installers and dropped on your computer during the installation process. Most users have no idea how this BehavesLike.Win32.Dropper.th threat is installed on there computer and what it is, until their Antivirus or Anti-Malware software detects it as a malicious threat or virus. Follow our instruction to remove this BehavesLike.Win32.Dropper.th threat and protect your computer against another virus or adware infection.
This is the same instance as before name changes frequently,
report on jan 30th from the same systrem picked up BehavesLike.Win32.DirectDownminer.tc
The same system picked it up on Feb 07 as BehavesLike.Win32.Dropper.tc
both being very similar to the original virus BehavesLike.Win32.Dropper.th.
----------------------------------------------------------THIRD VIRUS---------------------------------------------------------
Win.Adware.Agent-62042
Win.Adware.Agent is a program that contains adware, installs toolbars or will display pop-up advertisements on the computer.
Win.Adware.Agent it’s technically not a virus, but it does exhibit plenty of malicious traits, such as rootkit capabilities to hook deep into the operating system, browser hijacking, and in general just interfering with the user experience. The industry generally refers to it as a “PUP,” or potentially unwanted program.
The Win.Adware.Agent infection is designed specifically to make money. It generates web traffic, collects sales leads for other dubious sites, and will display advertisements and sponsored links within your web browser.
----------------------------------------------------------FOURTH VIRUS---------------------------------------------------------
Win32/Virus.RiskTool.e79
Microsoft security software detects and removes this threat.
This virus is a member of the Win32/Sality family. This family can delete Windows files with the extensions .SCR or .EXE.
This family can also end or close your antimalware software and other security-related processes.
This is an interesting little virus we have here that could try and close your security related process, to avoid detection, and remove the exe files that created it after the hacker is finished with getting what he needs accomplished on your PC as well as removing any .SCR or .EXE files he tells it to.
----------------------------------------------------------FIFTH VIRUS---------------------------------------------------------
Generic Suspicious
This is a Zero-Day Vulnerability back door trojan. a very intersting addition to the list of viruses. A Zero-Day Vulnerability virus is on in which the antivirus systems have zero days to plan and advise any mitigation against its exploitation. so usually by the time this particular virus has been found the damage is already done.
---------------------------------------------------------END REPORT----------------------------------------------------------