A new report, produced by CTA, revealed that the occurrence of malware for digital money extraction increased significantly in 2018. The reason for the rapid growth was presumably leaked by the code, stolen from US National Security Agency (NSA).  "Combined information on the threats provided by CTA members shows that this rapid growth shows no sign of slowing, despite recent decreases in the value of cryptocurrency", the CTA
reads the paper .
According to recent
research published by the Cyber Threat Alliance (CTA), the identification of illegal encryption activities has increased significantly. If we compare this year's data on the extraction of malicious data to those of last year, we will be impressed because it has increased by 459% in one year.
Eternal Blue, a program used to weaken the security of Microsoft software, is one of the most frequently applied malware. It appeared for the first time in 2017 and continues to cause damage. The hacking code is mainly used for the illegal extraction of Monero (85%), while Bitcoin mining produces only 8% of the total. Other virtual coins are mined at the 7% limit.
The fate of the victims
Bloomberg states that the mechanism was initially subtracted from the NSA by the so-called "Shadow Brokers" group of hackers. At the moment the NSA has not commented on this.
Russian and North Korean hackers have carried out a series of attacks on dozens of countries. The WannaCry malware was used by North Korea to target various government institutions, including British hospitals. Russia's NotPetya used Eternal Blue to attack leading European companies, such as Denmark
A.P. Moller-Maersk A / S . All victims suffered losses measured in billions of dollars.