Report: Malicious cryptocurrency mining affects 38% of companies worldwide

According to the Cyber ​​Security Report of Check Point Research, the cryptocurrency industry, like any other industry, is extremely vulnerable to cyber attacks in 2020.

Cloud infrastructure is the main target of crypto mining attacks

In 2019, no matter how large or small an organization is, it will inevitably be affected by cyber attacks. Of course, cybercrime is indeed profitable and therefore attractive to unethical individuals. Researchers estimate that cybercrime generated $ 1.5 trillion in losses in 2018.

The reason why Bitcoin is flexible is because of the randomness of data exchange in its blockchain and strong encryption functions. Therefore, blockchain and data cannot be copied or penetrated by malware or other malicious technologies. Nonetheless, once transactions in cryptocurrencies are still vulnerable to cyber attacks.

For example, for 2020, the Cybersecurity Report highlighted threats to cloud infrastructure related to cryptocurrency mining attacks. Despite the decline in the value of cryptocurrencies last year, cloud infrastructure provides a huge target for crypto malicious activities.

 

Malware in cryptocurrencies is defined as software programs and malware components that take over computer resources and use them for cryptocurrency mining without user permission.

 

Ransomware is getting more complex

Ransomware is another threat that will become more complex and targeted in 2019. Compared with 2018, mobile banking malware attacks increased by 50% in the first half of 2019. According to the report, "27% of all organizations worldwide are affected by cyber attacks involving mobile devices."

The report describes malware that specifically uses Bitcoin and not any other cryptocurrency. For example, Glipteba updates via command and control addresses of the public Bitcoin list. Therefore, Glipteba is used by browser thieves or stealing router permissions.

Cryptoloot can also be used for online mining of Monero tokens when intruders access the web without user authorization. In addition, Danabot is a banking Trojan for Windows platforms, which can also be used to steal browser passwords and wallets.

The researchers also highlighted how hackers used Ryuk ransomware to withdraw large sums of Bitcoin from victims.

The scope of cyber threats is becoming more extensive and complex. As a result, the report recommends that in order to stay ahead of criminals and avoid cyber attacks, rather than just discovering and remediating cyber attacks, organizations need to implement aggressive combat plans and keep threat intelligence current.

To prevent attacks, organizations first need sharp, real-time threat intelligence to provide the latest information on the latest attack vectors and hacking techniques. Threat intelligence must cover all attack surfaces, including cloud, mobile, network, endpoint, and IoT, as these vectors are common in enterprises.

Check Point Software Chief Intelligence Officer Lotem Finkelsteen said:

"2019 presents a complex threat landscape, with cybercriminals and private contractors speeding up the cyber arms race and increasing each other's capabilities at an alarming rate, which will continue until 2020. Even if the organization is equipped Advanced security products cannot completely eliminate the risk of damage. "

"In addition to detection and remediation, organizations need to take proactive plans to stay ahead of cybercriminals and prevent attacks. Detecting and automatically blocking attacks early can prevent damage."

The original text is sourced from bitcoinist, compiled by the Bluemountain Labs team.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

IMF urges Philippine central bank to collect crypto exchange transaction data and use data for macroeconomic analysis

According to Cointelegraph reported on January 2, the International Monetary Fund (IMF) urged the Philippine Central ...

Blockchain

FCoin thunders, Zhang Jian confesses that over 900 million yuan cannot be paid, and foreign exchanges have significant financial risks

Source: Finance and Economics · Chain Finance Author: Chen At about 6 pm on February 17, Zhang Jian, the founder...

Market

FTX's approval for liquidating $3.4 billion worth of tokens this week, what impact will it have on the market?

FTX may obtain court approval for asset liquidation on September 13th. Under the pressure of 3.4 billion sell-off, th...

Policy

The Shocking Revelation: When Alameda Research Borrowed More Than Just a Cup of Sugar from FTX

Exclusive Leaked Audio from Alameda Research Meeting Exposes Caroline Ellison's Disclosure of Misuse of FTX Deposits ...

Blockchain

The exchange is frequently stolen, and where is the security of digital currency going?

In the food chain of digital currency, the exchange has always stood at the top. But if you want to wear a crown, you...

Blockchain

Dividends or repurchases: conspiracy and conspiracy of the exchanges

Today, there is a gap between the major exchanges such as the fire currency, the currency security, and the OK. The r...