Cryptocurrency mining threat to business can't be ignored, warns report
Malware designed to mine Monero on the increase
Companies are increasingly being attacked by mining malware looking to extract Monero cryptocurrency, a new report has warned.
According to the GTIC Monero Mining Malware report, published by NTT Security, the cryptocurrency is being mined as it allows hackers the greatest amount of anonymity.
Researchers at NTT Security's Global Threat Intelligence Center (GTIC) found around 12,000 Monero mining malware samples, with the earliest dating back to March 2015. They also discovered that 66% of the samples were submitted from November to December 2017, indicating a substantial increase in the use of coin mining malware.
Around 40% of global internet traffic and data from a wide range of threat intelligence sources were analysed by researchers. Based on this data, they found that cyber criminals are using phishing emails as the primary vector to gain a foothold on a targeted system, which attackers can then leverage to mine Monero with the victim's resources.
The discovery of coin miners in a network environment suggests that more malicious activity could also exist there, such as backdoors and unpatched vulnerabilities. The company also found that legitimate coin mining services, such as Coinhive, could be abused and injected into mobile games and websites.
"Monero mining malware is installed on the victim's computer or smartphone without their knowledge and, once installed, it uses the victim's computing resources and electricity supply to mine cryptocurrencies. The rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing," said Terrance DeJesus, threat research analyst at NTT Security.
DeJesus added that organisations mustn't ignore the threat of mining malware. "The impact of an attack can go well beyond performance issues. Mining costs organisations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network," he added.
Four cyber security essentials that your board of directors wants to know
The insights to help you deliver what they needDownload now
Data: A resource much too valuable to leave unprotected
Protect your data to protect your companyDownload now
Improving cyber security for remote working
13 recommendations for security from any locationDownload now
Why CEOS should care about the move to SAP S/4HANA
And how they can accelerate business valueDownload now