Crypto Mining Incidents rose 1000% in 2018, says the latest report – Monero is still the favorite currency of hackers

[ad_1]

The Cybersecurity Trend Micro company revealed that between January and July 2018, company researchers detected unauthorized encryption attacks at a rate almost 1000% higher than the second half of last year.

The company announced this in its report entitled "Invisible threats, imminent losses."

Hackers choose encryption

A valuable insight that has been included in this report was the fact that cybercriminals who preferred to use malware and ransomware are currently increasingly looking to encrypt it as a new frontier.

"Over the next several months, we also noticed a noticeable shift from highly visible ransomware to more discrete detection: the extraction of cryptocurrencies – these harmful threats – from miners who quietly release power from victims' devices to Dangerous vulnerabilities that leave machines open to hidden attacks – divide limited security resources and divide the focus of IT administrators, "the report noted.

A cryptojacking attack can often escape detection by network security personnel and users can have debilitating consequences on a network or IT equipment such as response times and extreme phase displacements, even physical damage to the network. hardware due to excessive workload and overheating and peaks in energy use. [19659002]

Monero is the favorite crypt

In 2018, there have been various reports of encryption episodes that have affected hundreds of websites, including government sites and high-profile platforms by hackers who they extracted Monero.

their preferred encryption remains generally because it offers anonymity and market liquidity.

It is also very challenging ging to capture crypto jacker by tracing the funds of the Monero wallet. The reason is the fact that they use all kinds of encryption services to recycle their funds before withdrawing them.

To avoid becoming a victim of cryptojacking, it is recommended that network security administrators search for energy usage spikes, unusual usage patterns, or any type of unauthorized activity running on their networks.

[ad_2]Source link