Cryptocurrency Mining Malware detects up to almost 500% in 2018: report


The leaked code intended for Microsoft Systems that hackers allegedly robbed by the US National Security Agency (NSA) has triggered a fivefold increase in cryptocurrency malware infections, according to Bloomberg, Wednesday, September 19, citing a new report of cryptojacking.

Eternal Blue, the tool able to exploit the vulnerabilities of Microsoft software, is behind the now infamous global computer attacks WannaCry and NotPetya, which continue to cause disruptions since they first emerged in 2017. Bloomberg notes that Eternal Blue was removed from the NSA in 2017 by a hacking company called the Shadow Brokers.

Hackers used the tool to gain access to computers to secretly hide cryptocurrency, with surveys of 459% this year, according to the Cyber ​​Threat Alliance report (CTA

" The combined information on the threats provided by CTA members show that this rapid growth shows no signs of slowing down, even with the recent decline returns to the value of cryptocurrency, "writes the company in a preface to its most recent report, stating:

"Because this threat is relatively new, many people do not understand it, its potential meaning or what to do about it."

Cointelegraph has often reported the emergence of encryption malware infecting user devices such as PCs and smartphones rather than Bitcoin (BTC) or Ethereum (ETH), they are the privacy-focused altcoins like Monero, which are the preferred target of hackers, the report observes. [19659002] The uptick, CTA says, comes when such operations are becoming increasingly "sophisticated". "

" Analysts have observed successful and widespread attackers living off the ground "or using legitimate features to download and run miners that would be more difficult to detect for an observer or antivirus," continues the preface, highlighting the Monero Smominru mining campaign as an example.

The NSA did not respond to Bloomberg's request to comment on the results to the publication.

[ad_2]Source link