Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/21/2018
10:14 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

7 Cryptominers & Cryptomining Botnets You Can't Ignore

Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.
2 of 8

Coinhive

Coinhive is a cryptocurrency miner deployed on thousands of websites around the world - some with the knowledge and permission of the site owners, but often without their knowledge. It is designed to mine for the Monero cryptocurrency by surreptitiously hijacking the computing resources of the systems being used by visitors to these sites.

Coinhive by itself is not malicious. In fact, Coinhive.com has been making the miner available to website owners so they can run it in the browsers of users to their sites and make some Monero in return for giving users an ad-free experience. But multiple security vendors have begun blocking Coinhive because many site owners have been running the miner without informing users about it.

Cybercriminals too have been indiscriminately embedding the miner on thousands of websites without the knowledge of the site owners. Check Point Software Technologies has estimated that in January 2018 a staggering 23% of organizations worldwide were impacted by Coinhive.

Coinhive's in-browser JavaScript mining code was also secretly loaded into 19 Android apps sold on the Google Play store. One was installed on 100,000 to 500,000 devices, says Taylor Armerding, senior security strategist at Synopsys.

"RiskIQ crawling data found upwards of 50,000 websites with Coinhive either embedded directly into them or injected via a compromised third-party component, such as Texthelp, in the past year," says Vamsi Gullapalli, product manager at RiskIQ, citing recent data. Many of them were likely embedded without the original owners knowledge, he says.

Image Source: JK21 via Shutterstock

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/27/2018 | 7:48:20 PM
Mining Resources-Not Surprised
As someone who mines as a hobby I am not surprised. Resources to generate sustainable profit require heavy resources. GPU rigs, that are inflating the prices of dedicated GPU's, mine those hash values somewhat slowly. Utilizing botnets you can maximize your resources even if the targeted hosts have sub-optimal specificiations. Also, since the price of BTC is above 10K currently utilizing the malicious method can be effective from a mining perspective, though deplorable from an ethics perspective. But something tells me those individuals do not care too much in that regard.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.