Cryptocurrency mining threat to business can't be ignored, warns report
Malware designed to mine Monero on the increase
Companies are increasingly being attacked by mining malware looking to extract Monero cryptocurrency, a new report has warned.
According to the GTIC Monero Mining Malware report, published by NTT Security, the cryptocurrency is being mined as it allows hackers the greatest amount of anonymity.
Researchers at NTT Security's Global Threat Intelligence Center (GTIC) found around 12,000 Monero mining malware samples, with the earliest dating back to March 2015. They also discovered that 66% of the samples were submitted from November to December 2017, indicating a substantial increase in the use of coin mining malware.
Around 40% of global internet traffic and data from a wide range of threat intelligence sources were analysed by researchers. Based on this data, they found that cyber criminals are using phishing emails as the primary vector to gain a foothold on a targeted system, which attackers can then leverage to mine Monero with the victim's resources.
The discovery of coin miners in a network environment suggests that more malicious activity could also exist there, such as backdoors and unpatched vulnerabilities. The company also found that legitimate coin mining services, such as Coinhive, could be abused and injected into mobile games and websites.
"Monero mining malware is installed on the victim's computer or smartphone without their knowledge and, once installed, it uses the victim's computing resources and electricity supply to mine cryptocurrencies. The rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing," said Terrance DeJesus, threat research analyst at NTT Security.
DeJesus added that organisations mustn't ignore the threat of mining malware. "The impact of an attack can go well beyond performance issues. Mining costs organisations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network," he added.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now