{"id":28951,"date":"2019-10-15T10:58:20","date_gmt":"2019-10-15T14:58:20","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=28951"},"modified":"2022-03-17T06:57:35","modified_gmt":"2022-03-17T10:57:35","slug":"cryptojacking-2019","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cryptojacking-2019\/28951\/","title":{"rendered":"How to protect your business from the increasing risks of cryptojacking"},"content":{"rendered":"<p>In the far-off times of 2009, Bitcoin became the world\u2019s first decentralized cryptocurrency. No one knew the true identity of the person or people who invented it. So, we just use the pseudonym Satoshi Nakamoto, referred to in the original <a href=\"https:\/\/bitcoin.org\/bitcoin.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Bitcoin white paper<\/a> instead. Fast-forward 10 years, and we\u2019ve since seen dozens of other cryptocurrencies enter the market as well as a sharp rise, and dramatic crash, in their values in the last few years.<\/p>\n<p>Where there\u2019s money to be made, there\u2019s the constant threat of cybercrime. The anonymous nature of cryptocurrency transactions makes them the perfect cover for illegal operations. The dramatic rise of ransomware in recent years is undoubtedly the best-known example. Rather than ask for ransoms in easily trackable mainstream currencies, attackers demand payments in cryptocurrency, typically Bitcoin.<\/p>\n<p>Although the cryptocurrency market crashed in 2018, following an unprecedented boom-and-bust the previous year, cryptocurrency still has value, and it demonstrates growth from time to time just like most mainstream currencies. And, there\u2019s another way to obtain these virtual currencies aside from transactions \u2013 mining. Mining refers to the use of computing resources to validate transactions. This gives cybercriminals a new opportunity to make bank \u2013 by taking over victim\u2019s machines and using their resources to create virtual currency.<\/p>\n<h2>The new favorite cash cow for cybercriminals<\/h2>\n<p>2017 was a year of ransomware, with various high-profile attacks like WannaCry and NotPetya making headlines around the world. But ransomware often isn\u2019t very profitable, with hackers only having a <a href=\"https:\/\/www.csoonline.com\/article\/3253572\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\" target=\"_blank\" rel=\"noopener nofollow\">three percent success rate<\/a> of getting someone to pay to recover an infected computer. It also comes with a substantially higher risk of getting caught than many other attacks. That\u2019s not the case with the new threat \u2013 cryptojacking.<\/p>\n<p>First, let\u2019s look at the background. It takes a lot of computing resources to mine anything more than a trivial amount of cryptocurrency. During the cryptocurrency boom, miners were building powerful machines and running them around the clock. Discrete graphics cards, which have traditionally been marketed to gamers and 3D designers, <a href=\"https:\/\/www.digitaltrends.com\/computing\/cryptocurrency-mining-graphics-card-prices\/\" target=\"_blank\" rel=\"noopener nofollow\">soared in price<\/a> and entire server farms were assembled for the sole purpose of mining cryptocurrencies. Then, as the currencies crashed in 2018, people soon found out that the value of the cryptocurrencies their machines could mine wasn\u2019t even enough to pay for the electrical consumption.<\/p>\n<p>A <a href=\"https:\/\/securelist.com\/electricity-and-mining\/93292\/\" target=\"_blank\" rel=\"noopener\">recent study by Kaspersky<\/a> quantified the power consumption and environmental impacts of cryptocurrency mining. Some estimates suggest that the total amount of energy consumed by Bitcoin miners worldwide is comparable to the entire energy consumption of the Czech Republic, a country with more than 10-million people.<\/p>\n<p>Less honorable cryptocurrency miners soon found the perfect solution \u2013 use someone else\u2019s computer to do the job and have them foot the bill instead. Cryptojacking was born. Using many of the same tactics as those used to spread ransomware, criminals are now infecting millions of computers across thousands of networks with cryptojacking malware, which mines digital currencies and sends the funds directly to their anonymous digital wallets.<\/p>\n<p>To do it, criminals usually rely on social engineering tactics to dupe victims into loading malicious code onto their computers and wider networks. Another method, which requires a bit more technical expertise, is to inject malicious scripts into a vulnerable website or app and have it delivered to many computers that access them. The hacker then ends up with a huge network mining cryptocurrency at someone else\u2019s expense.<\/p>\n<p>Cryptojacking scripts are now widely available on the dark web marketplaces in the form of \u2018malware-as-a-service.\u2019 This trend allows almost anyone to get involved, regardless of the limitations of their technical skills. To make matters worse, cryptojacking infections don\u2019t require any downloads, and scripts run discretely, so they can operate for a long time undetected. The most popular cryptocurrencies to mine include lesser-known ones like Monero and Zcash, because they make it even harder to track illegal activity that the far more widespread Bitcoin.<\/p>\n<h2>What cryptojacking means for your business<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-28953\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/15105632\/M065-Inline_cryptojacking-1-1024x768.jpg\" alt=\"cryptojacking turtle\" width=\"1024\" height=\"768\"><br>\nWhile it\u2019s true that malicious mining is far less destructive than ransomware and many other cyber-threats, that doesn\u2019t mean it\u2019s something to take lightly. Cryptojacking attacks can result in both direct and indirect losses for a business. After all, the victims are the ones paying for all the computing power used. Aside from a substantial increase in electrical consumption, mining increases the wear and tear on hardware by having processing cores, including those belonging to discrete graphics cards, working overtime to mine ill-gotten cryptocurrency. These direct costs are compounded by the fact that cryptojacking attacks often go unnoticed for many months, and it\u2019s often difficult to quantify their true costs. A <a href=\"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-two\/23350\/\" target=\"_blank\" rel=\"noopener nofollow\">recent study by Kaspersky<\/a> even found that after maliciously mining cryptocurrency for two days\u2019 straight using mobile mining malware, the infected devices\u2019 batteries started to expand to the point of physically deforming the phones.<\/p>\n<p>All this wasted bandwidth also decreases the speed and efficiency of legitimate computing workloads. Most of us have experienced the frustrating situation when our computers grind to a halt due to a program consuming all available resources. Although there are many legitimate cases for this, such as automatic updates or resource-intensive background tasks, malicious mining shouldn\u2019t be one of them! When you have cryptojacking malware overwhelming a system, it can cause severe performance problems, which will have an immediate effect on your end users and, ultimately, your customers. If, for example, a healthcare provider is targeted, staff could be unable to quickly and reliably access critical patient health information. Attacks have also targeted critical infrastructure, including a <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener nofollow\">water company in Europe<\/a>.<\/p>\n<p>On the face of it, cryptojacking might seem like a simple hack, but the cybercriminals who deploy such attacks could be more risky than just opportunistic parasites. Like ransomware, cryptojacking may itself be used as a decoy to draw attention away from even more serious attacks. Other attacks may be combined with fake antivirus software to bombard victims with ads claiming they must pay to have their devices cleaned in a worrying blend of malicious mining and ransomware. On the surface, attacks might look financially motivated, but the potential of cryptojacking malware to overload infected systems and cause physical damage <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener nofollow\">might be the real end goal<\/a>.<\/p>\n<h2>How can you protect your business?<\/h2>\n<p>IT business leaders should never underestimate the damage that malicious mining can do. To mitigate the risks, they must use reliable security solutions across all devices, including public terminals, IoT devices and anything else with an internet connection. To protect against cryptojacking attacks specifically, it\u2019s also necessary to monitor processor usage across all endpoints, including those hosted in the cloud. Finally, be sure to look out for any frequent queries to IP addresses belonging to cryptocurrency mining pools. By taking these steps to protect yourself, you\u2019ll keep your computers working for <em>you<\/em>, and not for someone else.<\/p>\n<p><em>Article reflects the opinions of the author. <\/em><\/p>\n<p><em>Article published in 2019.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptojacking has overtaken ransomware as one of the biggest cybersecurity threats, but it\u2019s one that\u2019s often overlooked. <\/p>\n","protected":false},"author":2703,"featured_media":28952,"template":"","coauthors":[4311],"class_list":{"0":"post-28951","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-safer-business","7":"emagazine-category-trends"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cryptojacking-2019\/28951\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/28951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/28952"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=28951"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}