Why AD360
 
Solutions
 
Resources
 
 

Cryptojacking: A silent attacker in the world of crypto crime

By Suparna
Published on Jan 12, 2023

The growing global acceptance of cryptocurrency has caught the attention of cyber attackers. Lack of government regulations and no traceability have made cryptocurrency a favorite money laundering medium among cybercriminals This love for cryptocurrency also yielded cryptojacking, a silent attack in the world of crypto crime.

Cryptojacking surged in popularity during the late part of 2017, when Bitcoin prices reached a record high of $20,000. By 2021, cryptojacking incidents costing 97.1 million were recorded, according to the 2022 SonicWall Cyber Threat Report.

Rise of the cryptojacking era

The debut of Coinhive's cryptomining code in 2017 encouraged website owners to start browser mining with visitors' consent. Even UNICEF Australia deployed it in 2018 to collect donations. However, this ethical aid soon turned into a problem when hackers figured out a way to infect computer resources with easy-to-deploy JavaScript cryptomining code. Often, this type of attack goes unnoticed for a long time. Cryptojacking degrades the processing power of servers quietly and slowly from the inside, and users may not even be aware it's happening.

In comparison to ransomware attacks, effectively carrying out cryptojacking is a cake walk for attackers. While ransomware is a one-time attack targeting organizational data and disrupting operations, cryptojacking is less dangerous to organizations in terms of stolen data and tends to be carried out over the long term. Hackers can earn millions by mining cryptocurrency using unauthorized computer resources.

Cloud instances are easy targets because of their ability to keep expanding regardless of CPU capacity. More infected instances means faster mining processes and more currency created. Threat actors will first establish access to the network and then infiltrate further. According to a 2021 cybersecurity report from Google, 86% of hacked cloud instances were used for cryptocurrency mining.

There was a time when ransomware used to dominate cybercrime. Today it's compelling to witness ransomware rapidly vanishing and cryptocurrency mining starting to take its place.

Fighting the threat

Once a mining script is injected by malware and the device is hijacked, there's no turning back. In most cases, it is difficult to diagnose what's causing the symptoms of the infected devices, such as system crashes, slow performance, or overheating. Phishing scams were traditionally used to hijack victims' computers and install mining scripts such as Coinminer and XMRig. Modern attacks are more sophisticated and use fileless malware that runs only in a system's memory.

The presence of mining script in an organization's devices is an indicator of a weak security posture. If cryptojackers can crack the organization's security perimeter to inject malicious mining code, attackers could target those same vulnerabilities to carry out other types of attacks.

To mitigate such threats, IT security teams can leverage the following tools and practices to maintain sound cyber hygiene:

  • Use an asset management tool to gain visibility on endpoints across the organization's network and monitor the applications running on them.
  • Find an endpoint detection and response tool that can help IT security teams detect unusual network activities like sudden increases in memory usage by a particular website and respond to breaches.
  • Implement patch management, the first step in mitigating cybersecurity incidents. When it comes to cyber hygiene, the importance of updating applications, antivirus solutions, and malware protection software with the latest patches goes without saying.
  • Browse the internet cautiously and only download data from reliable sites, as cryptomining scripts are typically found in web browsers and advertisements. Deploying anti-cryptomining extensions and ad blockers helps stop the installation of such malware.
  • Disable JavaScript to make browsing safer.
  • Use a SIEM solution to protect against malicious websites and emails and helps organizations stay one step ahead by monitoring browsing activities.

Cryptojacking might not cause serious damage to the organization's data. However, the mere theft of resources, piled up over time, can negatively affect an organization's network performance and the productivity of its teams. This is why it's always better to take precautions early to avoid attacks like these altogether; as the saying goes: Prevention is better than a cure.

Related Stories

 
Chat now
   

Hello!
How can we help you?

I have a sales question  

I need a personalized demo  

I need to talk to someone now  

E-mail our sales team  

Book a meeting  

Chat with sales now  

Back

Book your personalized demo

Thanks for registering, we will get back at you shortly!

Preferred date for demo
  •  
    • Please choose an option.
    • Please choose an option.
  •  
  •  
    This field is required.

    Done

     
  • Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Schedule a demo’, you agree to processing of personal data according to the Privacy Policy.
Back

Book a meeting

Thanks for registering, we will get back at you shortly!

Topic

What would you like to discuss?

  •  
  • Details
  •  
    • Please choose an option.
    • Please choose an option.
    Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Book Meeting’, you agree to processing of personal data according to the Privacy Policy.