Crypto Miners: list of threats to cybersecurity; It affects 27% of organizations worldwide

[ad_2][ad_1]
The-Three-largest-Cybersecurity-threats-Are-Related-to-Crypto-Miners

The three biggest threats to cybersecurity are related to cryptographic miners

According to a recent report published by ZDNet, the three most widespread threats that spread on the internet are linked to cryptography miners. According to the Check Point of the cybersecurity group, the CoinHive Monero-mining threat is the most popular threat among these threats. Coinhive has been selected as the most pressing malware for the thirteenth consecutive month.

The second most common was XMRig and the third was the crypt miner JSECoin. Check Point informs that CoinHive has reached 12% of organizations worldwide, while the other malware reached respectively 8% and 7%.

CoinHive and JSECoin allow users to enter a code that will use the computing power of visitors to extract Monero (XMR). Monero is a very useful cryptocurrency to perform these attacks because it can be extracted with GPU or CPU power that visitors do not use.

There are several organizations and websites that use Coinhive to convert the computing power of visitors into charitable donations. However, hackers were able to exploit this software and force about 400,000 CPUs to extract Monero for them, according to a report by The Next Web.

Academics from the German RWTH Aachen University explained that the script was responsible for generating around $ 250,000 a month, referring to CoinHive. According to researchers from the Carlos III University of Madrid and the King & # 39; s College in London, 4.3% of all Monero has been extracted using cryptographic malware since 2007.

There were other ways to install this malware. Users have downloaded an infected file that started extracting Monero using the power of the CPU without even being in a specific website infected by these CoinHive injections.

Monero (XMR) is one of the most popular digital currencies on the market as it offers more privacy for users.

[ad_2]Source link