Bitcoin
$23,812.01
+241.15
(+1.02%)
Ethereum
$1,674.88
+42.5
(+2.6%)
Ripple
$0.41
0
(+0.44%)
Litecoin
$99.86
+2.18
(+2.23%)
EOS
$1.09
+0.03
(+3.02%)
Cardano
$0.40
+0.01
(+3.11%)
Stellar
$0.09
0
(+1.83%)
NEO
$8.97
+0.69
(+8.29%)
NEM
$0.04
0
(+0.8%)
DigitalCash
$61.95
+0.95
(+1.56%)
Tether
$1.00
0
(0%)
Binance Coin
$328.38
+11.58
(+3.66%)
QTUM
$2.77
+0.06
(+2.1%)
Verge
$0.00
0
(+2.94%)
Ontology
$0.22
+0.01
(+3.18%)
ZCash
$46.82
+0.38
(+0.82%)
Steem
$0.20
+0.01
(+3.46%)

Kaspersky reports spike in crypto miner variants in Q3 2022 – Back End News

0


In the third quarter (Q3 2022) of this year, Kaspersky researchers saw a sharp increase in crypto miner variants or an overall growth of over 230% compared to the same period last year. The popularity of cryptocurrency has skyrocketed in the past year and experienced highs and lows.

According to the cybersecurity solutions company, the number is three times more than in the third quarter of 2021 and now exceeds 150,000. Remaining hidden for months, cybercriminals use the processing power of the victim’s computer to mine cryptocurrency, with an income reaching up to $40,500 (2 BTC) per month. Monero (XMR) is the most popular cryptocurrency for malicious mining.

With the beginning of the “crypto winter of 2022,” when the value of cryptocurrencies dropped significantly, the cryptocurrency industry is facing a liquidity crisis. Despite that, criminal activity targeting the cryptocurrency industry does not seem to be slowing down, according to Kaspersky’s new research paper “The state of cryptojacking in 2022.”

Kaspersky finds Trojans targeting employee devices in PH
Password stealers target small businesses in SEA

“Cryptocurrency mining is a painstaking and costly process but very rewarding at the same time, which is why it attracts the interest of cybercriminals,” Kaspersky said.

Making money using crypto miners is profitable for cybercriminals — they don’t pay for equipment or for electricity, which will be rather expensive in 2022. After installing mining software on the victim’s computer, all the attacker needs to know is how to create a miner using open-source code or where to buy one. If the cryptomining malware is installed successfully on the victim’s computer, it provides its operator with steady earnings.

This year saw a sharp increase in the number of new modifications to malicious mining programs. During the first three quarters of 2022, expert analysis identified more than 200,000 new miners, which is more than twice as many as last year. This increase is only due to a sharp jump in the third quarter of 2022. In Q3 2022, the number of new malicious miners exceeded 150,000.

Malicious mining software

Most of the analyzed samples of malicious mining software (48%) secretly mine Monero (XMR) currency via the victim’s computer. This currency is known for its advanced technologies that anonymize transaction data to achieve maximum privacy. Those monitoring it cannot decipher addresses trading Monero, transaction amounts, balances, or transaction histories, all these factors are extremely appealing to cybercriminals.

Regarding the worlds’ most widely used cryptocurrency, Bitcoin wallets that were used in illicit mining accumulated around $1,500 on average in Bitcoin every month. The company’s researchers recorded an incoming transaction of 2 BTC, which is more than $40,500, per one analyzed wallet.

Backdoors

Most frequently, attackers distribute miners through malicious files masquerading as pirated content: films, music, games, and software. Unpatched vulnerabilities pose a serious challenge to users while being an appealing lure for cybercriminals who exploit them to spread to miners. Kaspersky’s telemetry shows that nearly every sixth vulnerability exploiting attack was accompanied by a miner infection. In Q3, miners became even more widespread than backdoors, which were the prime choice of cybercriminals throughout the first half of 2022.

To stay protected from crypto miners, Kaspersky experts also recommend:

  • Check the website’s authenticity. Do not visit websites allowing you to watch a movie until you are sure that they are legitimate and start with “https.” Confirm that the website is genuine, by double-checking the format of the URL or the spelling of the company name, reading reviews about it, and checking the domain’s registration data before starting downloads
  • Security solutions will protect your computer and other devices from unauthorized usage of your PC computing power to generate cryptocurrency and prevent deterioration of PC performance.
  • Always keep software updated on all the devices you use to prevent attackers from infiltrating your network by exploiting vulnerabilities.
  • Use a dedicated security solution such as Kaspersky Endpoint Security for Business with application and web control to minimize the chance for cryptominers to be launched; behavior analysis helps quickly detect malicious activity, while vulnerability and patch manager protects from cryptominers that exploit vulnerabilities.



Read More: Kaspersky reports spike in crypto miner variants in Q3 2022 – Back End News

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Notice: Undefined variable: ub in /home/c83w5hz05vw6/public_html/searchcryptonews.com/wp-content/plugins/elements-web-tracker-for-wordpress-W26ADT3-fkYtpIKq-03-15/diframework/ditools.php on line 650

Notice: Undefined variable: ub in /home/c83w5hz05vw6/public_html/searchcryptonews.com/wp-content/plugins/elements-web-tracker-for-wordpress-W26ADT3-fkYtpIKq-03-15/diframework/ditools.php on line 659

Deprecated: strripos(): Non-string needles will be interpreted as strings in the future. Use an explicit chr() call to preserve the current behavior in /home/c83w5hz05vw6/public_html/searchcryptonews.com/wp-content/plugins/elements-web-tracker-for-wordpress-W26ADT3-fkYtpIKq-03-15/diframework/ditools.php on line 659

Notice: Undefined variable: ub in /home/c83w5hz05vw6/public_html/searchcryptonews.com/wp-content/plugins/elements-web-tracker-for-wordpress-W26ADT3-fkYtpIKq-03-15/diframework/ditools.php on line 674

Get more stuff like this
in your inbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.