Cryptocurrency mining threat to business can't be ignored, warns report
Malware designed to mine Monero on the increase
Companies are increasingly being attacked by mining malware looking to extract Monero cryptocurrency, a new report has warned.
According to the GTIC Monero Mining Malware report, published by NTT Security, the cryptocurrency is being mined as it allows hackers the greatest amount of anonymity.
Researchers at NTT Security's Global Threat Intelligence Center (GTIC) found around 12,000 Monero mining malware samples, with the earliest dating back to March 2015. They also discovered that 66% of the samples were submitted from November to December 2017, indicating a substantial increase in the use of coin mining malware.
Around 40% of global internet traffic and data from a wide range of threat intelligence sources were analysed by researchers. Based on this data, they found that cyber criminals are using phishing emails as the primary vector to gain a foothold on a targeted system, which attackers can then leverage to mine Monero with the victim's resources.
The discovery of coin miners in a network environment suggests that more malicious activity could also exist there, such as backdoors and unpatched vulnerabilities. The company also found that legitimate coin mining services, such as Coinhive, could be abused and injected into mobile games and websites.
"Monero mining malware is installed on the victim's computer or smartphone without their knowledge and, once installed, it uses the victim's computing resources and electricity supply to mine cryptocurrencies. The rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing," said Terrance DeJesus, threat research analyst at NTT Security.
DeJesus added that organisations mustn't ignore the threat of mining malware. "The impact of an attack can go well beyond performance issues. Mining costs organisations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network," he added.
Preparing for long-term remote working after COVID-19
Learn how to safely and securely enable your remote workforceDownload now
Cloud vs on-premise storage: What’s right for you?
Key considerations driving document storage decisions for businessesDownload now
Staying ahead of the game in the world of data
Create successful marketing campaigns by understanding your customers betterDownload now
Solutions that facilitate work at full speedDownload now