Hidden mining cryptocurrency becomes a real threat to companies around the world — in spite of the fall in the value of digital money, the criminals still have their “mining” genuine interest, and most importantly, like to use to process other people’s computing power. As a result, at the end of 2018 more than a third of global companies have become victims of covert mining, according to the second part of the global report of the company Check Point Software Technologies. Moreover, every fifth company in the world continues to face such attacks every week.

As it turned out, a hidden mining has become for cheaters far more profitable way of earning compared to this previously popular form of attacks, like viruses ransomware, including cryptocurrency. The whole point of efficiency, for example: although the virus WannaCry were infected more than 400,000 computers, to make the attack managed $140 000, which for this market is quite small, reminiscent of Check Point. And if asking a ransom in bitcoin, its value in dollars and is a big question given the volatility of the prices. But most importantly, hidden mining is quite difficult to detect — the software remain invisible and allow you to earn income indefinitely without the knowledge of their victims.

Arsenal attackers obviously evolyutsioniruet. If a year ago the company ventured to face the kriptomayning on compromised sites now malware spread through Facebook Messenger, YouTube ads and Google Play, infecting tens of thousands of web sites, personal computers and powerful servers.

By the way, in 2018 cryptainer became interested in ever more powerful computing resources, the result were attacked, including industrial systems, nuclear plants and even cloud infrastructure. In 2018, attacks have also been of crypto currency exchange, and mobile miners even managed to sneak in the Apple App Store and using malware to steal credentials in the wallets of the cryptocurrency.

Whether to grow the significance of this threat in the future? It would seem that with the fall in the value of the cryptocurrency it needs to go on the decline. So, in December 2017 Check Point talked about the fact that illegal miners were subjected to 55% of the companies in the world. And by the end of February 2018, the victims were 42%.

However, the threat in any case looks increasingly important, and here’s why. Even today, not all companies affected by the attacks, declare the incident to the invasion. As they said “invest-foresight” founder of the Israeli High school of information technology and security HackerU Gil ADANI, often the company are silent about it so as not to harm reputation: we just don’t know about the large number of successful hacks and attacks.

There are far more significant factor — namely, overly relaxed attitude to the threat on the part of the attacked companies. It may be the last in the future a disservice. As shown by a recent study Check Point, companies still do not think cryptobinary significant problem. So much so that only 16% of organizations in the survey said that such incursions pose the biggest threat.

Meanwhile, it is noted in the Check Point, at the end of 2018 cryptobinary attacked 10 times more companies than, for example, ransomware. The latter just afraid of very much — 54% of the respondents consider is the biggest danger of this class of attacks. According to the company, 16% — very low-level threat assessment, especially compared to the DDoS attacks, which were considered the biggest danger 34%. The estimate is underestimated when comparing with the same class of threats as phishing, which are most afraid of 66% of the respondents. Much more than the kriptomayning, companies in the world, the fear of a data breach-at least so said 53% of study participants.

“The results suggest that program-cryptobinary can easily remain undetected to download and run other malware types”, — analysts said the company Check Point.

“Although during the 2018 cyber attacks were in the shade, they are still destructive and dangerous”, — says the head of the representative office of Check Point Software Technologies in Russia and the CIS Vasily Dyagilev.

He also notes that cybercriminals successfully explore new hidden methods and business models to increase their illegal profits and reduce risks. In addition to this, more and more have tools for attacks — the latter are becoming more democratic: advanced attack methods are now available to anyone who is willing to pay for them.

Author: Olga Blinova

Read more •••


Please enter your comment!
Please enter your name here