Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity

    Crypto-Mining Malware Rising Fast, Hackers Increasingly Targeting Cloud

    Written by

    Chris Preimesberger
    Published July 12, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      During the last couple of years, cyber-security has been largely about the huge influx of malware flowing through the veins of the internet. The problem hasn’t gone away by any means, but now in 2018 there’s an even larger threat: crypto-mining-specific malware.

      Check Point Software, a global provider of cyber-security solutions, on July 12 released its “Cyber Attack Trends: 2018 Mid-Year Report,” revealing that cyber-criminals are aggressively targeting organizations by using crypto-mining malware to develop illegal revenue streams. At the same time, cloud infrastructures appear to be the growing target among threat actors. 

      Crypto-currency mining, or crypto-mining, is a process in which transactions for various forms of crypto-currency are verified and added to a blockchain digital ledger. In order to be competitive with other crypto-miners, though, a crypto-currency miner needs a computer with specialized hardware.

      Crypto-mining malware enables cyber-criminals to hijack the victim’s CPU or GPU power and existing resources to mine crypto-currency, using as much as 65 percent of the end-user’s CPU power.  The top three most common malware variants seen in H1 2018 were all crypto-miners.

      Instances of crypto-mining malware have doubled in six months

      Between January and June 2018, the number of organizations impacted by crypto-mining malware doubled to 42 percent, compared to 20.5 percent in the second half of 2017. This is very alarming.

      In a new trend, Check Point detected an increasing number of attacks targeting cloud infrastructures. With organizations moving more of their IT estates and data to cloud environments, criminals are turning to the cloud to exploit its vast computational power and multiply their profits.

      The “Cyber Attack Trends: 2018 Mid-Year Report” gives a detailed overview of the cyber-threat landscape in the top malware categories – crypto-miners, ransomware, banking and mobile. These findings are based on data drawn from Check Point’s ThreatCloud intelligence between January and June 2018, highlighting the key tactics cyber-criminals are using to attack businesses.

      “The first half of this year saw criminals continue the trend we observed at the end of 2017, and take full advantage of stealthy crypto-mining malware to maximize their revenues,” Maya Horowitz, Threat Intelligence Group Manager at Check Point, said in a media advisory.  “We’ve also seen increasingly sophisticated attacks against cloud infrastructures and multi-platform environments emerging. 

      “These multi-vector, fast-moving, large-scale Gen V (fifth-generation) attacks are becoming more and more frequent, and organizations need to adopt a multi-layered cybersecurity strategy that prevents these attacks from taking hold of their networks and data.”

      Key malware trends in 2018 First Half

      Here are details on the malware trends from Check Point’s researchers, detected during the last six months:

      • Crypto-currency miners evolve: In 2018, crypto-miners have been upgraded with vastly improved capabilities, becoming more sophisticated and even destructive. Motivated by a clear interest to increase the percentage of computational resources leveraged and be even more profitable, crypto-miners today target anything that could be perceived as being in their way. Crypto-miners have also highly evolved recently to exploit high profile vulnerabilities and to evade sandboxes and security products in order to expand their infection rates.
      • Hackers move to the cloud:  So far this year, there have been a number of sophisticated techniques and tools exploited against cloud storage services. Several cloud-based attacks, mainly those involving data exfiltration and information disclosure, derived from poor security practices, including credentials left available on public source code repositories or the use of weak passwords. Crypto-miners are also, targeting cloud infrastructures to exploit its computational power and multiply profits for threat actors.
      • Multi-platform attacks on the rise: Up until the end of 2017, multi-platform malware was rare. However, the rise in the number of consumer connected devices and the growing market share of non-Windows operating systems has led to an increase in cross-platform malware. Campaign operators implement various techniques in order to take control over the campaigns’ different infected platforms.
      • Mobile malware spread via the supply chain: In the first half of this year, there has been several incidences where mobile malware that has not been downloaded from a malicious URL, but instead arrived already installed within the device. In addition, there was an increase in applications readily available on app stores that were actually malware under disguise, including Banking Trojans, Adware and sophisticated remote access Trojans (RATs).

      Top Crypto-miners during 2018 first half

      1. Coinhive (30 percent): A crypto-miner designed to perform online mining of the Monero crypto-currency without the user’s approval when a user visits a web page.  Coinhive only emerged in September 2017 but has hit 12 percent of organizations worldwide hit by it.
      2. Cryptoloot (23 percent): A JavaScript Crypto-miner, designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s approval.
      3. JSEcoin (17 percent): Web-based Crypto miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s approval.

      Top Ransomware During 2018 first half

      1. Locky (40 percent): Ransomware that spreads mainly via spam emails containing a downloader, disguised as a Word or Zip attachment, before installing malware that encrypts the user files.
      2. WannaCry (35 percent): Ransomware that was spread in a large scale attack in May 2017, utilizing a Windows SMB exploit called EternalBlue, in order to propagate within and between networks.
      3. Globeimposter (8 percent): Distributed by spam campaigns, malvertising and exploit kits. Upon encryption, the ransomware appends the .crypt extension to each encrypted file.

      Top mobile malware during 2018 first half

      1. Triada (51 percent): A Modular Backdoor for Android which grants superuser privileges to downloaded malware, as it helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
      2. Lokibot (19 percent): A mobile banking Trojan which targets Android smartphones and turns into a Ransomware, upon an attempt of the victim trying to remove its admin privileges.
      3. Hidad (10 percent): Android malware which repackages legitimate apps and then releases them to a third-party store. It is able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.

      Top banking malware during 2017 second half 

      1. Ramnit (29 percent): A banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data.
      2. Dorkbot (22 percent): A banking Trojan which steals the victim’s credentials using web-injects, activated as the user tries to login to their banking website.
      3. Zeus (14 percent): A Trojan that targets Windows platforms and often uses them to steal banking information by man-in-the-browser keystroke logging and form grabbing.

      Check Point claims that its ThreatCloud intelligence is the largest collaborative network to fight cybercrime and that it delivers threat data and attack trends from a global network of threat sensors.

      The ThreatCloud database holds more than 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

      A full PDF copy of the report is available here.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.