The cryptography market is heavily controlled by bears as the major cryptocurrency sells about $ 3,500 and total capitalization is $ 120 billion. However, this has no effect on crypto-mining malware.
In reality, it continues to be the main malware index. According to the press release of the Israeli computer security company Check Point, three encrypted encryption malware he was on the Global Threat Index for December 2018.
Check Point Software Technologies Ltd. is a provider of security solutions for companies and governments globally. The company with over 10,000 organizations currently under its security management system reports that despite the drop in prices across the encrypted market, organizations are still a target of cryptojacking.
Cryptojacking it is a form of cyber attack that diverts the processing power of the destination computer without the knowledge or consent of the owner. And the new data show that the top 10 of the index is "divided equally between crypto-miners and malware" to distribute threats.
Maya Horowitz, threat intelligence and head of the research team at Check Point said: "The diversity of malware in the Index indicates that it is critical for companies to adopt a multi-tier IT security strategy that protects both established malware families. that new threats ".
In the last 13 months, Coinhive has been maintaining the first position in a row that has had an impact on 12% of organizations around the world.
In Coinhive, Crypto Miner is designed to perform online mining activities of the Monero cryptocurrency that is performed when the user visits a Web page but without his knowledge or approval. This malware could also shut down the system because it "uses a large amount of computational resources from end-user machines to extract coins".
Privacy focused Monero remains a popular crypto choice for malicious mining operations according to research published earlier this month. There are more than 4 percent of the illicit supply of XMR on the market as stated by the authors Sergio Pastrana and Guillermo Suarez-Tangil,
"In this paper, we conduct the largest measure of cryptocurrency malware to date, analyzing about 4.4 million malware samples (1 million malicious miners)."
The second most common malware is XMRig while JEScoin closely monitors the one that holds 8% and 7% respectively. XMRig, an open source CPU extraction software is also used for the extraction of Monero cryptocurrency. This malware was first seen in May 2017.
With JSEcoin, which is a JavaScript miner that can be embedded in websites, you can run it directly on your browser in exchange for an in-game currency, experience without advertising or other incentives.
The analysis also highlighted that the open mining basins and ready-to-use programs that are available to attackers along with miners contribute to the popularity of cryptojacking.
According to a report published by Russian security company Kaspersky Labs in November of last year, mining cryptography malware remained popular throughout 2018. Although the bull run was exhausted in January and February 2018, the interest for cryptography it decreased, but it remained a constant threat.
[ad_2]Source link