A new report, produced by CTA, has revealed that the occurrence of digital currency mining malware greatly increased in 2018. The reason for the rapid growth has allegedly been leaked code, stolen from the US National Security Agency (NSA).
“Combined threat intelligence from CTA members show that this rapid growth shows no signs of slowing down, even with recent decreases in cryptocurrency value,” the CTA paper reads.
According to recent research published by Cyber Threat Alliance (CTA), the detection of illicit crypto mining activities has significantly risen. If we compare this year data on malicious mining to that of last year, we will be impressed because it has surged 459 % over a year.
Eternal Blue, a programme used to weaken the security of Microsoft software, is one of the most frequently applied malware. It has firstly appeared in 2017 and continues to cause damage. The hacking code is mostly used for illegal Monero mining (85%), while Bitcoin mining makes only 8% of the total number. Other virtual coins are mined at the limits of 7%.
Bloomberg states that the mechanism was initially stolen from the NSA by the so-called “Shadow Brokers” hacking group. The NSA currently has given no comments on the matter.
Russian and North Korean hackers performed a number of attacks on dozens of countries. WannaCry malware was used by North Korea to hit various governmental institutions, including Britan’s hospitals. Russia’s NotPetya used Eternal Blue to attack leading European companies, such as Denmark’s A.P. Moller-Maersk A/S. All victims have suffered losses measured by billions of dollars.
0 comments)
(