Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/11/2019
06:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cryptominers Remain Top Threat but Coinhive's Exit Could Change That

Coinhive has remained on top of Check Point Software's global threat index for 15 straight months.

Cryptominers continue to dominate the malware landscape, just as they did all of 2018. But a decision by cryptocurrency mining service Coinhive to shut down last week could change that soon, security vendor Check Point Software said in its latest malware threat report, released Monday.

Coinhive has topped Check Point's global threat index for 15 straight months, including this February.

Coinhive's software is designed to give website owners a way to earn revenue by using the browsers of site visitors to mine for Monero cryptocurrency. The software itself — like many other cryptominers — is not malicious. However, cybercriminals have been using Coinhive extensively to surreptitiously mine for Monero on hacked websites, making it a top threat to website operators globally in the process. Many websites that have installed Coinhive also have done so without explicitly informing site visitors about it.

"For now, I assume that Coinhive's shutdown will only cause its disappearance from the top 10 list," says Maya Horowitz, threat intelligence and research director at Check Point. Other coin-mining tools will likely remain a threat or become more widely distributed as criminals start using those tools instead of Coinhive, she says. Check Point's report shows that at least two other coin miners — Cryptoloot and Authedmine — moved up in the top 10 malware rankings last month, compared with January 2019.

However, the declining values overall of major cryptocurrencies (such as Monero and bitcoin) could soon begin affecting the will of threat actors to use miners, Horowitz notes. This could result in fewer cryptomining attacks overall and a greater focus by threat actors on more lucrative targets such as scalable cloud environments. Attackers could also start "finding new, yet unknown, paths to monetize on their attacks," Horowitz says.

In a blog post last Friday, security vendor Avast said Coinhive's decision to discontinue its service is not entirely surprising given the declining value of cryptocurrencies and the fact that security vendors were routinely blocking the software because of misuse.

The big question now is whether or not browser-based cryptojacking will decline altogether or whether some other crypto tool will rise to replace Coinhive. "Ultimately, Coinhive going out of business is a good thing for security, privacy, and transparency," according to the Avast blog post.

Totally, five of top threats in Check Point's global index currently are cryptomining-related. The other threats in the index include the GandCrab ransomware tool and two banking Trojans that have been around for some time — Ramnit and Emotet.

According to Check Point, its researchers have observed several campaigns distributing a new version of GandCrab widely in Canada, Germany, Japan, and Australia. The new version incorporates a key encryption change that renders ineffective a decryption tool that was developed for previous versions of the malware, Check Point said. One reason for GandCrab's growing popularity is the fact that the ransomware is offered as a service and is thus easily available to attackers, Horowitz says.

Check Point's report also shows that the most actively targeted vulnerabilities last month were once again issues that were disclosed and patched some time ago. One of the vulnerabilities in February, for instance, was an information disclosure flaw in Open SSL (CVE-2014-0160; CVE-2014-0346) that was first disclosed and patched in 2014.

"Threat actors often use the least sophisticated solution that would work," Horowitz says. So as long as many users do not patch their servers for these vulnerabilities, they would keep exploiting them. "Our yearly security report demonstrates that only a third of the attacks during 2018 exploited vulnerabilities disclosed in 2017–2018," she says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.