Why Crypto-Mining Malware Continues to Thrive
Despite hopes for a decline in malware threats, crypto-mining malware shows no signs of disappearing any time soon. In fact, it continues to dominate among hackers and is now making its way into more mobile apps.
Check Point’s Latest Findings
According to the most recent Global Threat Index by Check Point, the Coinhive crypto-miner impacted 22% of organizations in May 2018, showing a nearly 50% increase during that month alone. This marks the fifth consecutive month where crypto-mining malware has topped Check Point’s Most Wanted Malware Index. Coinhive remains at the top, with another crypto-mining malware, Cryptoloot, following closely behind with a global reach of 11%.
Exploiting Server Vulnerabilities
Cyber-criminals are taking advantage of unpatched server vulnerabilities in Microsoft Windows Server and Oracle Web Logic to mine cryptocurrency. Despite patches being available for at least six months, many organizations remain vulnerable to these attacks.
Mobile App Threats
Not only are instances of crypto-mining malware infection on the rise, with a reported 4,000% increase in Q1, but the problem is also spreading through mobile apps. Apple recently updated its app store review guidelines to combat malicious mining practices. Developers are now required to design apps that use power efficiently and may not run background processes like cryptocurrency mining, unless done off-device, such as in cloud-based mining.
Amazon is also fighting against infections spreading through Fire TV and Fire TV Stick devices. A variant of the ADB.Miner malware has been targeting these devices, using their Android-based operating system to mine for crypto and spread to other devices on the same network.
As the threat of crypto-mining malware continues to evolve and spread, organizations and users must remain vigilant in protecting their devices and networks from these malicious attacks.