Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/21/2018
10:14 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

7 Cryptominers & Cryptomining Botnets You Can't Ignore

Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.
Previous
1 of 8
Next

Image Source: WICHAI WONGJONGJAIHAN via Shutterstock

Image Source: WICHAI WONGJONGJAIHAN via Shutterstock

Cryptocurrency mining has emerged as the new big threat for organizations worldwide.

Many cybercriminals, looking to cash in on the crypto-craze, have begun hijacking computers and using their resources secretly to mine for cryptocurrencies.

One tactic has been to install miners for popular cryptocurrencies—especially Monero—on host systems and add them to massive cryptomining botnets. Another common tactic has been to embed mining tools in websites and secretly use the computing resources of visitors to these sites to mine for Monero and other digital currencies. Research released by Imperva Tuesday also reported that 88% of all remote code execution attacks in December 2017 drove targets to cryptomining malware download sites. 

The trend has impacted individuals and business severely. Vendors have reported numerous businesses suffering major operational disruptions as a result of mining tools being installed on servers and other business systems. In a report this week, Check Point Software Technologies estimated that a staggering 23% of organizations worldwide appear to have been impacted by the Coinhive mining tool alone. The company's list of top 10 malware threats for January 2018 includes three cryptomining tools.

Here, in no particular order, are seven of the most prolific cryptocurrency miners and botnets currently plaguing users globally.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/27/2018 | 7:48:20 PM
Mining Resources-Not Surprised
As someone who mines as a hobby I am not surprised. Resources to generate sustainable profit require heavy resources. GPU rigs, that are inflating the prices of dedicated GPU's, mine those hash values somewhat slowly. Utilizing botnets you can maximize your resources even if the targeted hosts have sub-optimal specificiations. Also, since the price of BTC is above 10K currently utilizing the malicious method can be effective from a mining perspective, though deplorable from an ethics perspective. But something tells me those individuals do not care too much in that regard.
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
CVE-2020-7222
PUBLISHED: 2020-01-18
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (...