According to a recent report by foreign media, IBM researchers found that cryptocurrency cybercrime activities in 2018 were mainly dominated by cryptocurrency mining attacks (cryptojacking), surpassing ransomware attacks. Experts said that the low intrusiveness and stealthiness of malicious cryptocurrency mining are the main reasons why it has quickly become the preferred attack vector for cyber criminals. (Image source: unsplash) Cybercriminals turn to cryptocurrency mining attacksIn a report released on February 27, IBM X-Force research team stated that in 2018, there was a significant increase in cyber attacks against organizations around the world. According to the report, cybercriminals appear to be moving away from ransomware and malware attacks, with cryptocurrency mining taking over the spotlight. The report noted that stealthy cryptocurrency mining attacks increased 450% from the first quarter to the fourth quarter of 2018. Meanwhile, ransomware attacks fell 45% during the same period. IBM said that cryptocurrency attacks are spreading across both desktop PCs and mobile platforms. In 2018, there were a number of similar attacks on everything from Tesla's cloud computing platform to the torrent download service The Pirate Bay (TBP). Cryptocurrency mining attacks are much less destructiveExperts say cybercriminals are turning to malicious cryptocurrency mining because it is less destructive. Charles Henderson of IBM X-Force Red told Fortune: With ransomware, you lose the customer after one transaction, so it's a one-time transaction, there's no recurring revenue - I mean, it's just a bad business. Henderson said mining attacks are akin to a revenue subscription model, where the hacker alliance can rely on a continuous revenue stream as long as the victims are unaware. However, with ransomware attacks, the attackers only receive one payment from each victim. There will be worse effects in the futureWhile on the surface, malicious cryptocurrency mining may not seem as threatening as ransomware and malware attacks, Henderson said that ignoring its spread could have serious consequences in the future. He added that it is unlikely for criminals to use mining attacks for malicious purposes. What's more, experts like Henderson say cybercriminals are perfecting their techniques. So, if left unchecked, cryptocurrency mining attacks could move from covert cryptocurrency mining to botnets used for spyware attacks. Therefore, we recommend that readers run the latest antivirus software versions and avoid installing programs from unofficial sources. |
<<: Ethereum: More than half of miners voted in favor of implementing ProgPow
>>: Bitcoin extortion: Hackers photoshopped nude photos of users and extorted $551 in Bitcoin
In fact, people will have wrinkles on their faces...
Is the Wang-shaped face good? As the name suggest...
In recent years, there have been many popular pal...
Many people like to write in high school or when ...
Many people have some understanding of triangle l...
A kind-hearted person must have a good-looking fa...
The face of a good wife and daughter-in-law The a...
Why ASIC makes everyone love and hate it? This ha...
New era, new requirements. Management talents not...
A lot of people know about dimples, but dimples a...
Birthmark and mole physiognomy: the product of th...
Although big front teeth do not look very beautif...
It is said in the physiognomy book that the prosp...
There are many meanings in facial features, and s...
Speaking of nasolabial folds, I believe everyone ...