Home / Others / CoinHive Monero Crypto Mining Epidemic hits 30,000 Pan India routers

CoinHive Monero Crypto Mining Epidemic hits 30,000 Pan India routers

Cryptojacking has been a problem for some time in the industry since the number of such attacks is growing at an alarming rate. According to the latest report published by the Cybersecurity Banbreach company, the number of routers in India that have been exploited by the cryptojacking software has doubled in the last month.

30,000 routers throughout India now have control of the cryptojacker

According to the Banbreach report, hackers have taken control of over 30,000 routers throughout India. During the execution of the research, Banbreach separated the areas of India into three distinct categories based on population density. The report states that 45% of routers exploited in India are located in the less densely populated regions.

Banbreach was able to successfully monitor Internet traffic and identify all devices connected to the Internet with public IP addresses. This allowed the company to examine the traffic that passes through the routers.

CoinHive seems to be a favorite tool for attackers. The main malware that is used by hackers is a modified version of the CoinHive mining protocol, which allows browsers to extract cryptography normally and is particularly focused on Monero. To make matters worse, it seems that hackers are trying to intensify the action of this malware and have even released new versions to spread it as quickly as possible. According to data collected and shared by McAfee Labs, there are over two and a half million versions of malware for cryptography and most of them are linked to CoinHive. All these versions have been released in the last three months.

On the hardware front, among the brands of routers most affected is the MikroTik brand of routers.

In addition, read: Monero [XMR] Malware mining in action with Drupal Vulnerability Exploitation

The increase in cryptojacking attacks

This report is not the first to show the increase in Cryptojacking. In June, the California-based information security company, Proofpoint Inc, provided the same data on CoinHive-based cryptographic attacks. According to the report, there has been a 460m percent increase in CoinHive-based cryptography attacks that the company also reveals that a large percentage of these attacks are being carried out via mobile phone apps. The cryptocurrency mine app, usually Monero – a coin focused on privacy, in the background while the phone is running. In early 2018, the company announced that there were 19 apps for smartphones infected with the CoinHive malware. Since then, these apps have been removed from the Google Play Store. However, Proofpoint reports that CoinHive's business appears to be increasing.

In April of this year, Symantec's latest Internet Security Threat Report (ISTR) found that cryptographic attacks exploded by 8.500% in 2017, becoming the latest threat to computer and personal security with cybercriminals. Also in July, Quick Heal said it had detected more than 3 million hits from the crypt between January and May 2018. Quick Heal Security Labs expects these numbers to grow further, as more cybercriminals exploit encryption as a profitable channel to generate illicit revenues.

The increase in crypto jacking is a real threat the world is facing today and over time it is quite clear that such attacks would increase in the multiple. So computer security companies have to play their game to cancel this risk.

Will there soon be a definitive solution for cryptojacking or cryriors will continue to attack users? Let us know your opinions on the same

Summary

CoinHive Monero Crypto Mining Epidemic hits 30,000 Pan India routers

Item name

CoinHive Monero Crypto Mining Epidemic hits 30,000 Pan India routers

Description

Cryptojacking has been a problem for some time in the industry since the number of such attacks is growing at an alarming rate. According to the latest report published by the Cybersecurity Banbreach company, the number of routers in India that have been exploited by the cryptojacking software has doubled in the last month.

Author

NILESH MAURYA

Publisher name

COINGAPE

Publisher logo

The content presented may include the personal opinion of the author and is subject to market conditions. Do your market research before investing in cryptocurrencies. The author or the publication has no responsibility for personal financial loss.




Source link