Story image

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list

16 Apr 2018

Check Point’s March 2018 Most Wanted Malware suggests that cryptomining malware is moving away from browser-based mining sessions and targeting the endpoint – or at least the XMRig malware is doing so.

In March this year there were a surge of cryptomining malware attacks – most notably the XMRig malware which landed eighth place on the list last month.

XMRig has been in the wild since May 2017 and landed a top 10 spot after a 70% increase in global impact. It affected 5% of organizations in March.

The malware doesn’t need an active web browser session on a targeted computer; instead it uses the computer itself to mine Monero cryptocurrency.

“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested in modifying and improving their methods in order to stay ahead of the curve,” comments Check Point threat intelligence group manager Maya Horowitz. 

“Besides slowing down PCs and servers, cryptomining malware can spread laterally once inside the network, posing a major security threat to its victims. It is therefore critical that enterprises employ a multi-layered cybersecurity strategy that protects against both established malware families and brand new threats.”

The Coinhive cryptominer took the top spot as the top most wanted malware in March. It mines the Monero cryptocurrency and targeted 18% of organizations. Rig EK placed second, targeting 17% of organizations; and Cryptoloot miner was third, targeting 15% of organizations.

March’s 2018’s Top 3 ‘Most Wanted’ Malware:

1.       Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's knowledge or approval

2.       Rig EK - Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer.

3.       Cryptoloot - Crypto-Miner that uses the victim’s CPU or GPU power and existing resources to add transactions to the blockchain and releasing new currency.

Lokibot, an Android banking Trojan which grants super user privileges to download malware, was the most popular malware used to attack organizations’ mobile estates followed by the Triada and Hiddad.

March’s Top 3 ‘Most Wanted’ mobile malware:

1.    Lokibot - Android banking Trojan and info-stealer, which can also turn into a ransomware that locks the phone.

2.    Triada - Modular Backdoor for Android which grants superuser privileges to downloaded malware.

3.    Hiddad- Android malware which repackages legitimate apps then releases them to a third-party store.

Check Point researchers also analyzed the most exploited cyber vulnerabilities. CVE-2017-10271 came first with a global impact of 26%, in second place was the SQL injection vulnerability impacting 19%, and in third place was CVE-2015-1635 with a global impact of 12% of organizations.

March’s Top 3 ‘Most Wanted’ vulnerabilities:

1.       Oracle WebLogic WLS Security Component Remote Code Execution (CVE-2017-10271)- A remote code execution vulnerability exists within Oracle WebLogic WLS. This is due to the way Oracle WebLogic handles xml decodes. A successful attack could lead to a remote code execution.

2.       SQL Injection- Inserting an injection of SQL query in input from client to application, while exploiting a security vulnerability in an application's software.

3.       Microsoft Windows HTTP.sys Remote Code Execution (MS15-034: CVE-2015-1635)- A remote code execution vulnerability has been reported in Windows OS. The vulnerability is due to an error in the way HTTP.sys handles a malicious HTTP header. Successful exploitation would result in a remote code execution.

Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Sonatype and HackerOne partner on open source vulnerability reporting
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
OutSystems and Boncode team up for better code analysis
The Boncode and OutSystems alliance aims to help organisations to build fast and feel comfortable that the work they're delivering is at peak quality levels.
Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.