Hackers are increasingly exploiting cryptojacking malware without needing active browsers

Crypto malware is quickly extending to non-browser applications, says Checkpoint

Bitcoin cryptocurrency mining

Hackers are quickly finding ways to launch cryptomining campaigns without the need for an active web browser, according to new research from Checkpoint.

The security firm's latest Global Threat Index has revealed a surge of cryptocurrency malware attacks, specifically an endpoint variant called XMRig.

First discovered in May 2017, XMRig has quickly become one of the most popular types of cryptomining malware among cyber criminals.

Advertisement - Article continues below

Between the date of discovery in May 2017 and March 2018, the malware had a 70 per cent increase in global impact. XMRig is so effective because it operates through end-points devices such as PCs and smartphones, rather than the web browser.

With it, crooks can mine the Monero cryptocurrency on apps that are running in the background instead of a web browser. These attacks normally go unnoticed.

As well as the rise of XMRig, the threat index reveals that Coinhive is still the most popular cryptocurrency mining script to get integrated into 'cryptojacking' malware, with it impacting 18 per cent of organisations.

The Rig EK 'exploit kit' came in a close second, scoring 17 per cent. The kit lets hackers exploit Flash, Java, Silverlight and Internet Explorer to launch cryptomining campaigns.

Meanwhile, Cryptoloot is listed as the third most wanted cryptocurrency malware. It harvests the victim's GPU or GPU power to mine cryptocurrencies.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Checkpoint has also ranked the most common mobile malware, with Android banking trojan Lokibot at the top of the list. With it crooks can steal important business information and lock people's phones

Triada, which is a described as a "modular backdoor for Android", is second on the list. The malware backdoor gives hackers superuser privileges over an infected device allowing them to download further malware. Hiddad, which repackages popular apps and sends them to third-party stores, is in last place.

The security research firm analysed the most exploited cyber vulnerabilities as well, with an Oracle remote code execution vulnerability (CVE-2017-10271 sporting a global impact of 26 per cent, the SQL injection vulnerability at 19 per cent, and a Microsoft Windows flaw (CVE-2015-1635) at 12 per cent.

Maya Horowitz, threat intelligence group Manager of Check Point, said cryptomining campaigns have been a "success story" for cyber criminals.

"XMRig's rise indicates that they are actively invested in modifying and improving their methods in order to stay ahead of the curve," Horowitz explained.

Advertisement - Article continues below

"Besides slowing down PCs and servers, cryptomining malware can spread laterally once inside the network, posing a major security threat to its victims.

" It is therefore critical that enterprises employ a multi-layered cybersecurity strategy that protects against both established malware families and brand new threats."

As interest builds around Bitcoin and other cryptocurrencies, malware and hack attacks designed to illegitimately generate digital money are likely to become more prevalent in the cyber security world, something IT managers and security officers should take note of. 

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/technology/34286/us-court-orders-alleged-bitcoin-inventor-to-split-his-bitcoin-hoard
Technology

US court orders alleged Bitcoin inventor to split his hoard

28 Aug 2019
Visit/digital-currency/30249/what-is-cryptocurrency-mining
digital currency

What is cryptocurrency mining?

6 Jan 2020
Visit/security/28031/what-is-blockchain
Security

What is blockchain?

13 Sep 2019
Visit/technology/34288/pat-gelsinger-bitcoin-today-is-not-ok
Technology

Pat Gelsinger: “Bitcoin today is not OK”

28 Aug 2019

Most Popular

Visit/security/cyber-crime/355171/fbi-warns-of-zoom-bombing-hackers-amidst-coronavirus-usage-spike
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/security/data-breaches/355173/marriott-hit-by-data-breach-exposing-personal-data-of-52-million
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020