Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

// // //
6/11/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb

Cryptomining Malware, Cryptojacking Remain Top Security Threats

Check Point's new global index report finds that cryptomining malware and cryptojacking schemes have surpassed ransomware as the number one threat to IT security.

Check Point's Global Threat Index for May confirms that cryptomining malware is replacing ransomware as the most prevalent online threat.

Indeed, the Coinhive cryptominer affected 22% of organizations worldwide, which is an increase of nearly 50% compared to April, according to the report. The malware works without consent or knowledge of the user to mine the Monero cryptocurrency.

This marks the fifth consecutive month where cryptomining malware was the top threat in the Check Point Index. In addition to Coinhive, the report identified three other cryptomining malware threats that have been seen across the globe over the last month:

  • Cryptoloot: is also cryptomining malware attack and stood second in the index with a global reach of 11% of organizations globally.
  • RoughTed malvertising: this malware came in third, affecting 8% of global organizations. This multi-platform attack vector can deliver scams, adware, exploit kits and ransomware.
  • Jsecoin: is a cryptominer in fourth place, but this JavaScript entity can offer the user a trade-off for the mining. This could be an ad-free experience or other benefits in return for use of CPU cycles that will be devoted to mining.

Check Point also looked at other kinds of threats.

(Source: Flickr)
(Source: Flickr)

The most exploited cyber vulnerabilities that they found in May were CVE-2017-7269, with a global impact of 46%, followed by CVE-2017-10271 affecting 40% of organizations worldwide. In third place was SQL injection, impacting 16% of organizations globally.

Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269) affects Windows Server 2003 R2 through Microsoft Internet Information Services 6.0. Due to a buffer overflow vulnerability resulted by improper validation of a long header in HTTP request, a remote attacker could execute arbitrary code or cause a denial of service.

A patch for this Microsoft vulnerability has been available since March 2017.

Oracle WebLogic WLS Security Component Remote Code Execution (CVE-2017-10271) allows remote code execution because of the way Oracle WebLogic handles XML decodes. A patch has been available since October 2017.

The classic injection of SQL query in input from client to application, while exploiting a security vulnerability in an application's software, was found to be in third place.


Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.

Threat actors are pragmatic, using both modern techniques -- two vulnerabilities published in 2017 -- and classic attack vectors such as SQL injection.

"With crypto-mining malware's consistent growth, cyber-criminals are innovating their techniques in order to find new ways to exploit victims' machines and net more revenue," Maya Horowitz, Threat Intelligence Group Manager at Check Point, wrote in a statement. "Now that they're seeking to infiltrate networks using unpatched server vulnerabilities, this is a clear reminder to organizations that security basics -- such as patching -- are critical to ensuring that networks remain secure."

This index is a call for security professionals to tend to the basic grunt work that needs to be performed to keep an organization secure, especially in those countries around the world where security has been treated as an afterthought.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file