Threat Intelligence

6/27/2018
02:10 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Coin Miner Malware Spikes 629% in 'Telling' Q1

Drastic growth suggests adversaries are learning how they can maximize rewards with minimal effort.

Coin miner malware has replaced ransomware as security's biggest threat, with samples spiking 629% in the first quarter of 2018, researchers at McAfee Labs report.

To put that number into context, consider this: Nearly 400,000 samples of coin miner malware were detected in Q4 2017, and 2.9 million known samples were found in Q1 2018. The drastic growth suggests adversaries are learning how they can maximize rewards with minimal effort.

Cryptomining's growth pattern is hypersensitive to the fluctuating value of digital currency, explains Raj Samani, chief scientist at McAfee. If you look at the growth of Bitcoin, for example, a spike in Bitcoin malware will follow about a week after its value rises.

"As the price of coins goes up, we are compounded by the availability of cryptomining malware as just as prolific … it's a huge jump," Samani emphasizes. Attackers' "infect and collect" strategy has driven the rise of cryptojacking, in which they hijack machines to mine cryptocurrency. It's more straightforward and less risky than established crimes like ransomware and data theft.

Profits generated through coin mining are not limited to Bitcoin. GandCrab ransomware, which infected 50,000 machines in the first three weeks of Q1 and replaced Locky as this quarter's ransomware leader, transacts ransom payments using dash currency instead of Bitcoin.

When people think cryptocurrency, they think of Bitcoin, and with good reason: It remains the first and most popular form of digital money. However, Bitcoin mining has become harder for attackers because it's no longer as profitable to mine Bitcoin with the standard equipment in servers and desktops. Now you need graphic cards or ASIC chips to reap the same benefits.

As Cryptomining Goes Up, Other Threats Go Down
The rampant rise of cryptominers demands a follow-up question: Which types of cyberattacks are going down? Ransomware is on the decline as cryptojacking increases, Samani points out. McAfee researchers also saw attackers move away from PowerShell exploits, which fell 77%, and turn toward LNK malware, which rose 59% during Q1 2018.

"It's probably quite a telling quarter because there have been a lot of changes," Samani notes.

Adversaries no longer need to prompt victims for money; they can simply take it from them. Kaspersky Lab research further supports the fall of ransomware in favor of coin miners. A new report found the total number of people who encountered ransomware fell nearly 30%, from almost 2.6 million in 2016-2017 to 1.8 million in 2017-2018.

In comparison, the number of people who faced coin miners rose nearly 44.5%, from about 1.9 million in 2016-2017 to 2.7 million in 2017-2018. Of the overall threats detected, the share of miners grew from almost 3% in 2016-2017 to over 4% in 2017-2018.

New malware samples were down overall this quarter, McAfee researchers found. In Q1 2018, McAfee Labs recorded an average of five new malware samples per second – a decrease from eight new samples per second recorded in the previous quarter.

"I guess it's good news … but I wouldn't necessarily go out and buy the champagne just yet," Samani explains."We're still talking about 44 million new [malware] samples, which was a 31% decrease from Q4, which was one of the highest amounts of malware samples we've ever had."

Attackers Are Stepping Up Their Game. Are You?
McAfee's Q1 2018 Quarterly Threat Report puts the spotlight on three major campaigns: the Gold Dragon implant targeting the 2018 Winter Olympic Games, Lazarus Group's Bitcoin-stealing phishing campaign, and Operation GhostSecret, which deployed the Bankshot implant.

"The underlying thing I'm seeing is they are getting better, they are adapting their techniques, and they are improving," Samani says of the attacks' commonalities.

He uses the Olympics attack as an example. The Gold Dragon implant is part of a fileless attack targeting organizations involved with the 2018 Games in Pyeongchang, South Korea. While many fileless malware threats use PowerShell to launch an attack in memory and create a backdoor, Gold Dragon was specifically built to target the Olympics and persist on infected systems. It was also crafted to check on antimalware processes and evade detection.

The actors behind the Olympics attack used a steganography tool to embed malicious code within seemingly benign content. While this is not a new technique, Samani points out the actors continued to edit the campaign as it was going on, demonstrating a high level of capability as they tested and rolled out new software to continue their attack.

Samani asked: How many security teams can adjust an application, perform QA, and have it launched and fully live in eight days? Adversaries are ahead of the game. They're reading the threat data researchers generate, and they're going to continue to adapt, target more systems, and evade defenses. He urges security pros to catch up with threat intel.

"As organizations, the best defense you can have is to be informed, get access to information, and use that information as proactively as you can," he says.

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-2491
PUBLISHED: 2018-11-13
When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps...
CVE-2018-2473
PUBLISHED: 2018-11-13
SAP BusinessObjects Business Intelligence Platform Server, versions 4.1 and 4.2, when using Web Intelligence Richclient 3 tiers mode gateway allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
CVE-2018-2476
PUBLISHED: 2018-11-13
Due to insufficient URL Validation in forums in SAP NetWeaver versions 7.30, 7.31, 7.40, an attacker can redirect users to a malicious site.
CVE-2018-2477
PUBLISHED: 2018-11-13
Knowledge Management (XMLForms) in SAP NetWeaver, versions 7.30, 7.31, 7.40 and 7.50 does not sufficiently validate an XML document accepted from an untrusted source.
CVE-2018-2478
PUBLISHED: 2018-11-13
An attacker can use specially crafted inputs to execute commands on the host of a TREX / BWA installation, SAP Basis, versions: 7.0 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40 and 7.50 to 7.53. Not all commands are possible, only those that can be executed by the <sid>adm user. The commands execut...