Cryptocurrency mining threat to business can't be ignored, warns report
Malware designed to mine Monero on the increase
Companies are increasingly being attacked by mining malware looking to extract Monero cryptocurrency, a new report has warned.
According to the GTIC Monero Mining Malware report, published by NTT Security, the cryptocurrency is being mined as it allows hackers the greatest amount of anonymity.
Researchers at NTT Security's Global Threat Intelligence Center (GTIC) found around 12,000 Monero mining malware samples, with the earliest dating back to March 2015. They also discovered that 66% of the samples were submitted from November to December 2017, indicating a substantial increase in the use of coin mining malware.
Around 40% of global internet traffic and data from a wide range of threat intelligence sources were analysed by researchers. Based on this data, they found that cyber criminals are using phishing emails as the primary vector to gain a foothold on a targeted system, which attackers can then leverage to mine Monero with the victim's resources.
The discovery of coin miners in a network environment suggests that more malicious activity could also exist there, such as backdoors and unpatched vulnerabilities. The company also found that legitimate coin mining services, such as Coinhive, could be abused and injected into mobile games and websites.
"Monero mining malware is installed on the victim's computer or smartphone without their knowledge and, once installed, it uses the victim's computing resources and electricity supply to mine cryptocurrencies. The rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing," said Terrance DeJesus, threat research analyst at NTT Security.
DeJesus added that organisations mustn't ignore the threat of mining malware. "The impact of an attack can go well beyond performance issues. Mining costs organisations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network," he added.
How to scale your organisation in the cloud
How to overcome common scaling challenges and choose the right scalable cloud serviceDownload now
The people factor: A critical ingredient for intelligent communications
How to improve communication within your businessDownload now
Future of video conferencing
Optimising video conferencing features to achieve business goalsDownload now
Improving cyber security for remote working
13 recommendations for security from any locationDownload now