{"id":21482,"date":"2018-03-07T08:54:03","date_gmt":"2018-03-07T13:54:03","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=21482"},"modified":"2019-11-15T06:40:26","modified_gmt":"2019-11-15T11:40:26","slug":"miners-threaten-your-business","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/miners-threaten-your-business\/21482\/","title":{"rendered":"How hidden mining threatens your business"},"content":{"rendered":"<p><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-end-of-the-year-2017\/19335\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Reflecting on 2017<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/19186\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">peering into our crystal ball for the year ahead<\/a>, we predicted that ransomware \u2014 which ran riot in 2017 \u2014 would be unseated by sophisticated new cyberthreats in the form of cryptocurrency miners. Our <a href=\"https:\/\/securelist.com\/mining-is-the-new-black\/84232\/\" target=\"_blank\" rel=\"noopener noreferrer\">latest study showed<\/a> that miners have not only lived up to expectations, they\u2019ve exceeded them.<\/p>\n<p>Over the past six months, cybercriminals have raked in more than $7 million through injecting cryptominers. Here we explain how miners work on users\u2019 computers, why they\u2019ve become a major cyberthreat (especially for businesses), and how to protect your infrastructure against them.<\/p>\n<h2>The rise of the miners<\/h2>\n<p>In 2017, when the Bitcoin and altcoin (alternative cryptocurrencies) exchange rates hit the stratosphere, it became clear that owning tokens (which can be converted into real money) is a lucrative business. An especially attractive feature of cryptocurrency economics is that, unlike with real money, anyone can create digital currency by building on the blockchain by performing mathematical calculations and getting rewarded for it (see <a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/18020\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a> for details of how the blockchain works).<\/p>\n<p>A general rule of mining pools (organizations that unite miners) is that the more calculations you make, the more tokens you receive. The only problem is that the more calculations you want to perform, the more computing power you need \u2014 and the more electricity you\u2019ll consume.<\/p>\n<p>So it wasn\u2019t long before cybercriminals hit upon the idea of using other people\u2019s computers to mine cryptocurrency \u2014 after all, it\u2019s in their DNA to exploit Internet technologies to make a fast buck. Ideally, of course, it\u2019s done so that victims\u2019 computers perform the calculations without the knowledge of their owners or administrators. For obvious reasons, cybercriminals are particularly fond of large corporate networks with hundreds of machines.<\/p>\n<p>And they are getting very adept at putting their schemes into practice. As we speak, more than 2.7 million users worldwide have been attacked by \u201cmalicious miners\u201d \u2014 that\u2019s 1.5 times more than in 2016 \u2014 and the number continues to climb. Let\u2019s talk a bit more about what technologies the attackers use.<\/p>\n<h3>A hidden threat<\/h3>\n<p>The first method bears all the hallmarks of technologies used to carry out <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">advanced persistent threats<\/a> (APT), which have been featured heavily in recent large-scale <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a> campaigns. These same methods \u2014 for example, attacks using the infamous EternalBlue exploit \u2014 are now being used to distribute hidden miners.<\/p>\n<p>Another way to install a hidden miner on a victim\u2019s computer is to convince the user to download a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dropper\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">dropper, which then downloads a miner<\/a>. Typically, cybercriminals lure users into downloading a dropper by masking it as an ad or a free version of a product, or through some phishing technique.<\/p>\n<p>After being downloaded, the dropper runs on the computer and installs the actual miner along with a special utility that hides the miner in the system. The package can include autostart and autoconfig tools that might, for example, configure how much processing power the miner is allowed to use depending on what other programs are running, so as not to cause system slowdown and arouse the user\u2019s suspicion.<\/p>\n<p>These tools might also prevent the user from stopping the miner. If the user detects the miner and tries to disable it, the computer will simply reboot, after which the miner will continue as before. Interestingly, most hidden miners reuse the code of their legit counterparts, which further complicates detection.<\/p>\n<p>There is another way to mine tokens illegally: <a href=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/19186\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Web mining<\/a>, or mining from the browser. This is made possible by a site administrator embedding a mining script that runs in the browser when a victim visits the site. It can also be done by an attacker who has gained site administration access. While the user is on the site, their computer builds blocks (from which the criminal behind the script profits).<\/p>\n<p>\u00a0<\/p>\n<h3>How can businesses protect devices from miners?<\/h3>\n<p>\u00a0<\/p>\n<p>Today\u2019s sophisticated attack technologies and complexities of detection have enabled cybercriminals to create entire <a href=\"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18488\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">botnets<\/a> from victims\u2019 computers and use them for hidden mining. Needless to say, a business infrastructure with large processing capacity is a juicy target for cybercrooks. Your company\u2019s devices might be at risk as well. Therefore, we recommend implementing the following measures to protect your business:<\/p>\n<ul>\n<li>Install security solutions on all computers and servers in use to keep your infrastructure an attack-free zone;<\/li>\n<li>Carry out regular <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/cybersecurity-services?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2b_kasperskydaily_lnk_______\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">security audits of your corporate network<\/a> for anomalies;<\/li>\n<li>Keep a periodic eye on the Task Scheduler, which can be used by intruders to start malicious processes;<\/li>\n<li>Don\u2019t overlook less obvious targets, such as queue management systems, POS terminals, and even vending machines. As the miner that relied on the EternalBlue exploit shows, such equipment can also be hijacked to mine cryptocurrency;<\/li>\n<li>Use specialized devices in Default Deny mode \u2014 this will protect them from miners and many other threats, too. For example, Default Deny mode can be configured using Kaspersky Endpoint Security for Business.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company<\/p>\n","protected":false},"author":2455,"featured_media":20136,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,374,392,2640,2420,80,1134,2041,2639,337,2752,97,333,422],"class_list":{"0":"post-21482","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-bitcoin","11":"tag-botnet","12":"tag-cryptocurrencies","13":"tag-endpoint","14":"tag-fraud","15":"tag-internet","16":"tag-kaspersky-endpoint-security","17":"tag-mining","18":"tag-sas","19":"tag-sas-2018","20":"tag-security-2","21":"tag-security-analyst-summit","22":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/miners-threaten-your-business\/21482\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/miners-threaten-your-business\/12728\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/miners-threaten-your-business\/10538\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/miners-threaten-your-business\/14848\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/miners-threaten-your-business\/13160\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/miners-threaten-your-business\/12598\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/miners-threaten-your-business\/15479\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/miners-threaten-your-business\/15149\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/miners-threaten-your-business\/19851\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/miners-threaten-your-business\/4793\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/miners-threaten-your-business\/9045\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/miners-threaten-your-business\/16048\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/miners-threaten-your-business\/19832\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/miners-threaten-your-business\/19763\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/miners-threaten-your-business\/19789\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21482"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21482\/revisions"}],"predecessor-version":[{"id":29787,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21482\/revisions\/29787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20136"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}