IBM warns: Cryptocurrency mining attacks have surpassed ransomware attacks as the preferred attack vector for cyber criminals

IBM warns: Cryptocurrency mining attacks have surpassed ransomware attacks as the preferred attack vector for cyber criminals

According to a recent report by foreign media, IBM researchers found that cryptocurrency cybercrime activities in 2018 were mainly dominated by cryptocurrency mining attacks (cryptojacking), surpassing ransomware attacks. Experts said that the low intrusiveness and stealthiness of malicious cryptocurrency mining are the main reasons why it has quickly become the preferred attack vector for cyber criminals.

(Image source: unsplash)

Cybercriminals turn to cryptocurrency mining attacks

In a report released on February 27, IBM X-Force research team stated that in 2018, there was a significant increase in cyber attacks against organizations around the world.

According to the report, cybercriminals appear to be moving away from ransomware and malware attacks, with cryptocurrency mining taking over the spotlight.

The report noted that stealthy cryptocurrency mining attacks increased 450% from the first quarter to the fourth quarter of 2018. Meanwhile, ransomware attacks fell 45% during the same period. IBM said that cryptocurrency attacks are spreading across both desktop PCs and mobile platforms.

In 2018, there were a number of similar attacks on everything from Tesla's cloud computing platform to the torrent download service The Pirate Bay (TBP).

Cryptocurrency mining attacks are much less destructive

Experts say cybercriminals are turning to malicious cryptocurrency mining because it is less destructive. Charles Henderson of IBM X-Force Red told Fortune:

With ransomware, you lose the customer after one transaction, so it's a one-time transaction, there's no recurring revenue - I mean, it's just a bad business.

Henderson said mining attacks are akin to a revenue subscription model, where the hacker alliance can rely on a continuous revenue stream as long as the victims are unaware. However, with ransomware attacks, the attackers only receive one payment from each victim.

There will be worse effects in the future

While on the surface, malicious cryptocurrency mining may not seem as threatening as ransomware and malware attacks, Henderson said that ignoring its spread could have serious consequences in the future. He added that it is unlikely for criminals to use mining attacks for malicious purposes.

What's more, experts like Henderson say cybercriminals are perfecting their techniques. So, if left unchecked, cryptocurrency mining attacks could move from covert cryptocurrency mining to botnets used for spyware attacks. Therefore, we recommend that readers run the latest antivirus software versions and avoid installing programs from unofficial sources.


<<:  Ethereum: More than half of miners voted in favor of implementing ProgPow

>>:  Bitcoin extortion: Hackers photoshopped nude photos of users and extorted $551 in Bitcoin

Recommend

Face shape introduction: Wangzi face

Is the Wang-shaped face good? As the name suggest...

What kind of palmistry is deep

In recent years, there have been many popular pal...

Palmistry for future writing skills

Many people like to write in high school or when ...

What does it mean when the lifeline forks and forms a triangle?

Many people have some understanding of triangle l...

A kind-hearted person must have a good-looking face

A kind-hearted person must have a good-looking fa...

The face of a good wife and a good daughter-in-law

The face of a good wife and daughter-in-law The a...

Ulord public chain pioneered the CryptoHello algorithm to prevent ASIC

Why ASIC makes everyone love and hate it? This ha...

What are the characteristics of management talents?

New era, new requirements. Management talents not...

What does a dimple on the right side mean?

A lot of people know about dimples, but dimples a...

What does a woman with big front teeth mean?

Although big front teeth do not look very beautif...

Knowing people by their faces - what kind of people are kind-hearted

It is said in the physiognomy book that the prosp...

What does it mean when the root of the mountain is connected to the forehead?

There are many meanings in facial features, and s...

Analysis of nasolabial folds: what does a blessed nasolabial fold look like?

Speaking of nasolabial folds, I believe everyone ...