The number of internet users that have been attacked by malicious crypto currency mining software has increased from 1.9 million to 2.7 million in just one year. Statistics for the last 24 months show that miners are increasingly focused on developing markets, and are taking advantage of internet users in these regions to grow their revenues. This is one of the key findings in Kaspersky Lab’s annual ransomware and malicious crypto miners report, 2016-2018.

 

The report, which covers two similar periods (April to March 2016-2017 and April to March 2017-2018), shows that while ransomware can provide cybercriminals with potentially large but one-off rewards in a turbulent landscape, miners might make less money out of their victims, but through a more sustainable/ longer-term model. This is naturally gaining popularity among the cybercriminal community.

 

Kaspersky Lab experts have detected a significant change in the cyberthreat landscape: PC and mobile ransomware attacks on unique users dropped dramatically in 2017-2018 (by almost 30% and 22.5% respectively). Cybercriminals are instead opting to make their money out of crypto currency miners – specialized “mining” software which creates a new currency unit (or coin) by using the computing power of the victim PC and mobile devices. Malicious miners do so at the expense of other users, capitalizing on the power of their computers and devices without their knowledge.

 

According to the report, PC crypto miners are steadily growing. The total number of users who encountered this form of mining rose from 1,899,236 in 2016-2017, to 2,735,611 in 2017-2018.

 

Mobile crypto miners are also emerging as a threat, with unique attacks growing by 9.5%. Overall, this form of mining targeted almost 5,000 users in 2017-2018, compared to around 4,500 users in 2016-2017. Mobile users in China and India are particularly victimized by this threat.

 

“The reasons behind these changes in the cyberthreat landscape are clear. For cybercriminals, ransomware is a noisy and risky way of making money; it attracts media and state attention. The mining model however, is easier to activate and more stable – you attack your victims, discreetly build crypto currency using their CPU or GPU power, and then transfer that into real money through legal exchanges and transactions,” notes Anton Ivanov, security expert at Kaspersky Lab”.

 

Other key findings from the report include:

  • The total number of users who encountered ransomware fell by almost 30%, from 2,581,026 in 2016-2017 to 1,811,937 in 2017-2018;
  • The proportion of users who encountered ransomware at least once out of the total number of users who encountered malware fell by around 1 percentage point, from 3.88% in 2016-2017 to 2.80% in 2017-2018;
  • Among those who encountered ransomware, the proportion who encountered cryptors fell by around 3 percentage points, from 44.6% in 2016-2017 to 41.5% in 2017-2018;
  • The number of users attacked with cryptors almost halved, from 1,152,299 in 2016-2017 to 751,606 in 2017-2018;
  • The number of users attacked with mobile ransomware fell by 22.5% from 130,232 in 2016-2017 to 100,868 in 2017-2018;
  • The total number of users who encountered miners rose by almost 44.5% from 1,899,236 in 2016-2017 to 2,735,611 in 2017-2018;
  • The share of miners detected, from the overall number of threats detected, also grew from almost 3% in 2016-2017 to over 4% in 2017-2018;
  • The share of miners detected, from overall risk tool detections, is also on the rise – from over 5% in 2016-2017 to almost 8% in 2017-2018;
  • The total number of users who encountered mobile miners also grew – but at a steadier pace, growing by 9.5% from 4,505 in 2016-2017 to 4,931 in 2017-2018.

 

To reduce the risk of infection with ransomware and miners, users are advised to:

  1. Treat email attachments, or messages from people you don’t know, with caution. If in doubt, don’t open it.
  2. Back up data regularly.
  3. Always keep software updated on all the devices you use. To prevent miners and ransomware from exploiting vulnerabilities, use tools that can automatically detect vulnerabilities and download and install patches.
  4. For personal devices, use a reliable consumer security solution and remember to keep key features – such as System Watcher – switched on.
  5. If you’re a business, enhance your preferred third party security solution with newest version of Kaspersky Anti-Ransomware Tool.
  6. For superior protection use an endpoint security solution that is powered by behavior detection and able to roll back malicious actions.
  7. Don’t overlook less obvious targets, such as queue management systems, POS terminals, and even vending machines. As the miner that relied on the EternalBlue exploit shows, such equipment can also be hijacked to mine cryptocurrency.
  8. Use application control to track malicious activity in legitimate applications. Specialized devices should be in Default Deny mode. Use dedicated security solution, such as Kaspersky Endpoint Security for Business that includes these functions.
  9. To protect the corporate environment, educate your employees and IT teams, keep sensitive data separate, restrict access, and always back up everything.
  10.  Last, but not least, remember that ransomware is a criminal offence. You shouldn’t pay. If you become a victim, report it to your local law enforcement agency.

 

Check out the No Ransom website for the latest decryptors, ransomware removal tools, and information about ransomware protection.

 

Read the full version of the report on Securelist.com.


RECOMMENDED ARTICLE FOR TECHWORLD


Metamudkip
The Sudden Rise of the Shadow Brokers
Techworld • By: Metamudkip | Date Posted: 25 January 2018 4:26 PM | 214 Views
Governments have long been known to seek more information about their populace. In the United States, for example. See More
Metamudkip
The Sudden Rise of the Shadow Brokers
Techworld • By: Metamudkip | Date Posted: 4:26 PM | 214 Views
Governments have long been known to seek more information about their populace. In the United States, for exampleSee More

 
Say Goodbye to Dead Spots at Home and Say Hello to Google WiFi! PLDT Teams Up with Google to Give You the Strongest and Seamless Connections at Home
Techworld Date Posted: 25 October 2018 2:32 PM | 136 Views
Nothing ruins an online experience like an interrupted connection. Whether you’re streaming the final episode of your favorite series, uploading an important file to make a deadline or video calling with your bestfriend abroad,.... See More
 
Say Goodbye to Dead Spots at Home and Say Hello to Google WiFi! PLDT Teams Up with Google to Give You the Strongest and Seamless Connections at Home
Techworld Date Posted: 2:32 PM | 136 Views
Nothing ruins an online experience like an interrupted connection. Whether you’re streaming the final episode of your favorite series, uploading an important file to make a deadline or video calling with your bestfriend abroad,...See More

 
ADATA P10050C Power Bank Wins Golden Pin Design Award 2018
Techworld Date Posted: 20 October 2018 9:16 AM | 54 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is proud to announce that its P10050C power bank has won the Golden Pin Design Award 2018. This win for the.... See More
 
ADATA P10050C Power Bank Wins Golden Pin Design Award 2018
Techworld Date Posted: 9:16 AM | 54 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is proud to announce that its P10050C power bank has won the Golden Pin Design Award 2018. This win for the...See More

 
CTO Reflections: Beyond the Appliance
Techworld Date Posted: 30 August 2017 3:46 PM | 166 Views
For anyone reading the news regularly, it's not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider's perspective, I can add that tackling.... See More
 
CTO Reflections: Beyond the Appliance
Techworld Date Posted: 3:46 PM | 166 Views
For anyone reading the news regularly, it's not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider's perspective, I can add that tackling...See More

 
D-Link’s Enhanced Wi-Fi Gigabit Routers, Security Cameras Deliver Improved Connectivity, Security
Techworld Date Posted: 20 March 2018 5:05 PM | 493 Views
Manila, Philippines – D-Link, one of the world’s biggest suppliers of home networking products, matches the growing demand for high-speed connectivity and improved home security with enhanced Wi-Fi gigabit routers and security cameras.. See More
 
D-Link’s Enhanced Wi-Fi Gigabit Routers, Security Cameras Deliver Improved Connectivity, Security
Techworld Date Posted: 5:05 PM | 493 Views
Manila, Philippines – D-Link, one of the world’s biggest suppliers of home networking products, matches the growing demand for high-speed connectivity and improved home security with enhanced Wi-Fi gigabit routers and security cameras.See More

 
2018 Cyber Security Predictions
Techworld Date Posted: 16 December 2017 12:00 PM | 503 Views
This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defenses. See More
 
2018 Cyber Security Predictions
Techworld Date Posted: 12:00 PM | 503 Views
This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defensesSee More

 
Nokia 8: Three Firsts in One Precision Ddesigned Flagship
Techworld Date Posted: 17 August 2017 11:37 AM | 188 Views
HMD Global, the home of Nokia phones, today announced the Nokia 8, a high performance, beautifully crafted smartphone, designed with content creators in mind. The Nokia 8 brings three world-firsts to Android smartphones, including.... See More
 
Nokia 8: Three Firsts in One Precision Ddesigned Flagship
Techworld Date Posted: 11:37 AM | 188 Views
HMD Global, the home of Nokia phones, today announced the Nokia 8, a high performance, beautifully crafted smartphone, designed with content creators in mind. The Nokia 8 brings three world-firsts to Android smartphones, including...See More

 
XPG SX8200 Named as One of the Best SSDs on the Market
Techworld Date Posted: 2 June 2018 10:05 AM | 251 Views
ADATA’s XPG SX8200 M.2 2280 SSD has been named as one of the best SSDs on the market by tech media Tom’s Hardware. Receiving a 9/10 score, the reviewer cited the SSD’s strong consumer.... See More
 
XPG SX8200 Named as One of the Best SSDs on the Market
Techworld Date Posted: 10:05 AM | 251 Views
ADATA’s XPG SX8200 M.2 2280 SSD has been named as one of the best SSDs on the market by tech media Tom’s Hardware. Receiving a 9/10 score, the reviewer cited the SSD’s strong consumer...See More

 
Nokia Mobile Store, Kiosks Open in SM Malls
Techworld Date Posted: 28 May 2018 4:27 PM | 250 Views
In line with its goal of connecting the world one Nokia phone at a time, HMD Global, the home of Nokia phones, is excited to announce the opening of its new Nokia mobile concept.... See More
 
Nokia Mobile Store, Kiosks Open in SM Malls
Techworld Date Posted: 4:27 PM | 250 Views
In line with its goal of connecting the world one Nokia phone at a time, HMD Global, the home of Nokia phones, is excited to announce the opening of its new Nokia mobile concept...See More

 
Motorola Expands Retail Footprint in VisMin, Shares 2018 Plans
Techworld Date Posted: 22 February 2018 9:51 AM | 209 Views
Since its launch in 2016, Motorola Philippines has gone full throttle in making the Motorola experience more accessible to Filipinos nationwide.. See More
 
Motorola Expands Retail Footprint in VisMin, Shares 2018 Plans
Techworld Date Posted: 9:51 AM | 209 Views
Since its launch in 2016, Motorola Philippines has gone full throttle in making the Motorola experience more accessible to Filipinos nationwide.See More


Power by

Download Free AZ | Free Wordpress Themes