Cryptojacking malware on websites soars in second quarter 2018
Criminals seem increasingly keen to cause damage without alerting the website owner to any malicious activity
Sitelock has revealed that the number of sites attacked using cryptojacking has doubled in the second quarter of 2018 compared to the first quarter.
The company explained that criminals are choosing to attack websites using this method because it goes almost completely undetected by the site owner, but can surreptitiously generate income for the hackers.
Sitelock examined six million sites to compile its Q2 report and discovered that websites are attacked an average of 58 times a day on average, which was up 16% compared to the previous quarter.
The report also found that in some cases up to 61% of traffic website owners believe are genuine users are actually bots, which can cause quite some confusion and may well be a reason why businesses are struggling to convert people coming to their site into customers and revenue streams.
However, Sitelock said search engines are making the fight against malware-infected websites harder, only blocking around 17% of websites that are affected from showing up in search results.
"Website owners that continue relying on outwardly facing symptoms or search engine warnings may be missing malware that is attacking their website visitors," Jessica Ortega, site security analyst at Sitelock said.
"This is especially concerning when you consider that 9%, or as many as 1.7 million websites, have a major security vulnerability that could allow attackers to deploy malware on them."
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now