sb-eu logo
Story image

Cryptomining malware a genuine threat to organizations, NTT Security says

12 Mar 2018

NTT’s Global Threat Intelligence Center suspects that cryptocurrency mining malware may set its sights on organisations as the demand for cryptocurrency swells to unprecedented heights.

Cryptocurrency investment is not a new phenomenon but it has peaked significantly since late 2017, NTT says. As cryptocurrency values fluctuate wildly, this has led to the development of cryptocurrency mining (cryptomining) malware designed to generate revenue for cyber threat actors.

NTT Security has visibility into 40% of global internet traffic and a variety of threat intelligence sources. It found that criminals are using phishing emails to target a system. An infected system is then used to mine XMR cryptocurrency using the victim’s resources.

According to an NTT Security white paper, the average Windows PC can run 50 or more processes at any one time, which puts strain on CPU use. However if shutting down some of those resources still results in high CPU usage, the problem count be related to cryptomining.

Cryptomining can increase electricity usage, slow down device performance, and may affect brand reputation.

There are more than 12,000 Monero mining malware samples, with the earliest dating back to 2015. However, 66% of those samples were submitted between November and December 2017.

NTT Security threat research analyst Terrance DeJesus says that as digital currencies are adopted as part of moneymaking ventures, cybercriminals are overcoming barriers and taking profits for themselves.

“Monero mining malware is installed on the victim’s computer or smartphone without their knowledge and, once installed, it uses the victim’s computing resources and electricity supply to mine cryptocurrencies. And the rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing,” DeJesus says.

While phishing emails are the most common ways or infecting systems, the discovery of coin miners in a network could suggest that there are other threats lurking. These threats could include backdoors and unpatched vulnerabilities.

“Organizations mustn’t ignore the threat of mining malware. The impact of an attack can go well beyond performance issues. Mining costs organizations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network,” DeJesus explains.

“The use of coin miners will, without a doubt, grow and become more advanced in time, possibly being built into other malware types such as banking Trojans, as well as ransomware. There are serious business implications to ignoring this current threat. We are encouraging all organizations to be more vigilant of cybersecurity threats to their business. There are often simple and effective ways to mitigate risks, but too often the most obvious things are overlooked.”

NTT Security suggests that organisations mitigate cryptomining malware risks by:

  • Conducting regular risk assessments to identify vulnerabilities in the organization.
  • Adopting a defense-in-depth approach to cybersecurity — i.e., have multiple layers of security in place to reduce exposure to threats.
  • Regularly updating systems and devices with the latest patches, and deploy intrusion, detection and prevention systems to stop attacks.
  • Educating employees on how to handle phishing attacks, suspicious email links, and unsolicited emails and file attachments.
  • Proactively monitoring network traffic to identify malware infection, and pay close attention to the security of mobile devices.
Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Misinformation on the rise, organisations consider how best to respond
The increase in misinformation and fake domains have left organisations perceiving the threat level to be ‘very significant’, with a third planning greater emphasis on their ability to respond in coming months.More