Cryptojacking is catching up to ransomware as the most popular attack vector, according to a number of recently published research reports. To be sure, ransomware is still prevalent and dangerous to businesses and households. But cryptojacking is definitely gaining ground.
What does that mean for security teams? Before I go any further, let me set the record straight about cryptomining and cryptojacking.
- Cryptomining is the action of mining cryptocurrencies, such as bitcoin, ether (from Ethereum), Ripple, Litecoin, Monero, and one (or more) of over 1,600 other cryptocurrencies currently available from numerous sources.
- Cryptojacking is illegally mining cryptocurrencies. It involves stealing by leveraging the computer and graphics processing power from unsuspecting users’ devices to mine crypto, without their permission or knowledge. It can also involve stealing already mined cryptocurrency from another’s crypto wallet. There are countless ways for attackers to cryptojack cryptocurrency, and all of them not on the up-and-up.
While ransomware has been the "go to" play for attackers for some time, ransomware can be complicated. It typically involves a great deal of research, reconnaissance, social engineering, and technical acumen. It can take time to develop the malware to deliver the ransomware, not to mention the ransomware itself. And, the payouts, while once lucrative, have now become smaller and smaller, with some companies, educational institutions, and municipalities refusing to pay the ransom, leaving the attacker without what they wanted in the first place: quick, untraceable cash.
A user might say, "so what?" After all, their device hasn’t been infected with malware, like ransomware. All the attacker is stealing is a little power; so, what’s the problem? But, the user will experience the problem firsthand when their system slows to a crawl, and accessing anything on their device becomes exponentially more difficult. It’s even worse if the user’s device has been cryptojacked by a novice; they could max out the performance of the CPU on the device to try and solve more of the complex, sophisticated mathematics problems it takes to mine crypto. That would put the computer at risk, possibly destroying it in the process.
Now, imagine the same situation, but instead in a corporate data center. Imagine if all of the servers had cryptomining software loaded on them, and were simply churning through the math problems to mine crypto. Corporate services would slow down, causing lost productivity, at best. At worst, if that same situation were to happen at, say, a data center for an electrical utility, it could cause a brownout or a blackout, since the services would be running slower and slower, as the computations increase as crypto is being mined. If the target was a healthcare provider’s data center, and access to electronic health records (EHR) slowed to a crawl, it could mean the difference between life and death.
As more attackers move to cryptojacking, they are also looking for new and foolproof ways to gain access to processing and graphics power. It has now become so difficult to solve the math that leads to a bitcoin payout (which cannot be made on just a single bitcoin, but on a bitcoin block; the number of bitcoins per block – which comprise a blockchain – varies, but has been in the 12+ bitcoin range), most serious miners use hundreds of specific, expensive ASIC-based mining systems. But, it’s far easier to mine ether or litecoin, or any of the other cryptocurrencies available.
Plus, for the attackers, the payout is much higher, and has a better guarantee of payoff than ransomware, at this point. The return on cryptocurrencies may continue to be volatile, but at least the outcome is certain: There will be a “payday” for the attacker, in untraceable currency, which is not assured anymore when it comes to ransomware demands.
How can businesses protect themselves and their devices from cryptojacking? Here are five places to start:
- Determine if the on-device processes are consuming mass quantities of device resources, or it is coming from a browser-based miner. Check CPU and GPU usage on computing devices.
- Keep patches updated. This should go without saying; but, unfortunately, it needs to be stated and restated.
- Use an anti-malware program or service that blocks cryptominers, and/or download a cryptominer blocking plug-in for your browser. But be forewarned: these programs and services can be usurped and fooled into complacency.
Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Register before July 27 and save $700! Click for more info.