Cryptojacking malware on websites soars in second quarter 2018

Criminals seem increasingly keen to cause damage without alerting the website owner to any malicious activity

Bitcoin cryptocurrency mining

Sitelock has revealed that the number of sites attacked using cryptojacking has doubled in the second quarter of 2018 compared to the first quarter.

The company explained that criminals are choosing to attack websites using this method because it goes almost completely undetected by the site owner, but can surreptitiously generate income for the hackers. 

Another shocking realisation discussed in the report is that JavaScript files are also being used by criminals more frequently to attack sites. In the second quarter, malicious JavaScript files were used to deploy cryptomining attacks in 16% more cases.

Sitelock examined six million sites to compile its Q2 report and discovered that websites are attacked an average of 58 times a day on average, which was up 16% compared to the previous quarter.

Advertisement
Advertisement - Article continues below

The report also found that in some cases up to 61% of traffic website owners believe are genuine users are actually bots, which can cause quite some confusion and may well be a reason why businesses are struggling to convert people coming to their site into customers and revenue streams.

However, Sitelock said search engines are making the fight against malware-infected websites harder, only blocking around 17% of websites that are affected from showing up in search results.

"Website owners that continue relying on outwardly facing symptoms or search engine warnings may be missing malware that is attacking their website visitors," Jessica Ortega, site security analyst at Sitelock said.

"This is especially concerning when you consider that 9%, or as many as 1.7 million websites, have a major security vulnerability that could allow attackers to deploy malware on them."

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-to-pursue-hostile-hp-takeover-after-30bn
mergers and acquisitions

Xerox to pursue hostile HP takeover after $30bn gambit fails

28 Nov 2018
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019