Researchers at security firm Light Cyber revealed this week that one of the malware programs aimed to use the resources of infected PCs to perform the calculations necessary to run a Bitcoin network. Revealed earlier this month by fellow security firm Fox IT, the campaign spread its package by using Yahoo's ad server to deploy malicious ads. The malware took advantage of vulnerabilities in Java to install itself on computers that visited the ads.yahoo.com site. So far, Yahoo hasn't revealed any details on the infected computers or publicly advised affected users on what they should do. But security firm Surfright shed a bit more light on the situation.
Not every ad on the Yahoo advertisement network contained the malicious iframe, but if you have an outdated version of Java Runtime (you can check here) and you used Yahoo Mail the last 6 days, your computer is likely infected.
Communication with the following Internet domains is an indication of a positive infection of the communicating computer:
kmymmeiaoooigke.org bgdjstkwkbhagnp.org ceigqweqwaywiqgu.org smsfuzz.com
Communication with the following Internet domains/IP addresses is an indication of a possible infection:
The existence of the following files is an indication of a positive infection:
%localappdata%\cygwin1.dll (See note 1)
%localappdata%\wuauclt.exe (See note 1)
%localappdata%\temp\????????.lnk (8 hex characters)
%localappdata%\temp\????????.exe (8 hex characters)
(1) filename is used by legitimate software but not in the listed path