This is the right place to get the lowdown on the anatomy of the Cryptonight virus attack on Mac and fix the annoying problem in several simple steps.
The current cryptocurrency ecosystem is seeing a huge spike in light of the steady increase of Bitcoin value that seems to be getting blown out of proportion, frankly speaking. Anyway, the unlimited opportunities associated with unregulated digital cash have given rise to the new gold rush, with its benign and shady facets. One of the ways to succeed in this competitive cyber environment is to mine coins. In layman’s terms, it means using computing power to solve complex mathematical puzzles which, in turn, bolster the security of the so-called cryptocurrency ledger. There is, however, a thin line between legitimate and malicious cryptocurrency mining. While some people and companies invest in hardware to do it, others go an easier route and leverage malicious code like Cryptonight to get rich.
How exactly does this questionably ethical scheme work? Once the above-mentioned infection, also referred to as JS:Cryptonight [Trj], takes root on a Mac computer, it parasitizes on the machine’s processing resources such as CPU and GPU. The motivation for doing so is to mine cryptocurrency known as Monero. The nefarious part of this whole tactic is that the code harnesses one’s hardware power without asking for the user’s consent. As a result, the Cryptonight virus has an appreciable system footprint. The Mac will start running much slower than usual, seemingly for no apparent reason.
The only red flag some users encounter is that their antimalware solution recurrently displays security alerts reporting JS:Cryptonight Trojan on their Macs. According to these notifications, the culprit’s location path is private-var-db-uuidtext (see screenshot above). Some AV vendors, though, have admitted this is a false positive due to macOS changes made in the course of the latest update. In particular, Apple may have created a new file that exhibits the behavior of an unauthorized cryptocurrency miner, and the security suites’ heuristics identify it as a threat.
Cryptonight malware manual removal for Mac
The steps listed below will walk you through the removal of this application. Be sure to follow the instructions in the order specified.
• Open up the Utilities folder as shown below
• Locate the Activity Monitor icon on the screen and double-click on it
• Under Activity Monitor, find the entry for Cryptonight, select it and click Quit Process
• A dialog should pop up, asking if you are sure you would like to quit the troublemaking process. Select the Force Quit option
• Click the Go button again, but this time select Applications on the list. Find the entry for Cryptonight on the interface, right-click on it and select Move to Trash. If user password is required, go ahead and enter it
• Now go to Apple Menu and pick the System Preferences option
• Select Accounts and click the Login Items button. The system will come up with the list of the items that launch when the box is started up. Locate Cryptonight there and click on the “-“ button
Use automatic tool to uninstall JS:Cryptonight malware from your Mac
1. Download and install MacBooster application (read review). The tool provides both optimization and security features for your Mac. As part of obliterating the Cryptonight infection proper, consider also checking your machine for other security risks and performance issues by hitting the Scan button.
2. Proceed to the Uninstaller feature, find Cryptonight onthe Applications list and have MacBooster completely eliminate all components of the app from your Mac by clicking Uninstall in the bottom part of the GUI. Doing so will ensure all components of the malware and its remainders, which may have not been removed in the manual way, will be thoroughly cleaned up.