Cryptojacking malware on websites soars in second quarter 2018

Criminals seem increasingly keen to cause damage without alerting the website owner to any malicious activity

Bitcoin cryptocurrency mining

Sitelock has revealed that the number of sites attacked using cryptojacking has doubled in the second quarter of 2018 compared to the first quarter.

The company explained that criminals are choosing to attack websites using this method because it goes almost completely undetected by the site owner, but can surreptitiously generate income for the hackers. 

Another shocking realisation discussed in the report is that JavaScript files are also being used by criminals more frequently to attack sites. In the second quarter, malicious JavaScript files were used to deploy cryptomining attacks in 16% more cases.

Advertisement - Article continues below

Sitelock examined six million sites to compile its Q2 report and discovered that websites are attacked an average of 58 times a day on average, which was up 16% compared to the previous quarter.

The report also found that in some cases up to 61% of traffic website owners believe are genuine users are actually bots, which can cause quite some confusion and may well be a reason why businesses are struggling to convert people coming to their site into customers and revenue streams.

However, Sitelock said search engines are making the fight against malware-infected websites harder, only blocking around 17% of websites that are affected from showing up in search results.

Advertisement
Advertisement - Article continues below

"Website owners that continue relying on outwardly facing symptoms or search engine warnings may be missing malware that is attacking their website visitors," Jessica Ortega, site security analyst at Sitelock said.

"This is especially concerning when you consider that 9%, or as many as 1.7 million websites, have a major security vulnerability that could allow attackers to deploy malware on them."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020