A month ago, police detained two engineers of the Russian Federal nuclear center in Sarov for mining cryptocurrency on a supercomputer. Their example is not unique, but employees of companies cause much less damage than the malicious software for mining. Researchers from Check Point Software Technologies foundthat in February 2018 from such AT affected 42% of companies around the world.
Mining without attachments
The most popular malware for covert mining analysts described as CoinHive — the virus has infected a fifth of companies in the world. This is followed by Cryptoloot (16%) and the Rig exploit kit EK (15%).
For the last four months we see a noticeable increase in the spread of cryptainer. This constant threat will greatly slow PCs and servers. After penetration into the network cryptobinary can also be used to perform other malicious actions.
Most of the attacks were in Botswana and Cameroon, least of all of the hidden mining suffered Liechtenstein and Kyrgyzstan.
In Russia, attacks were 60% of the companies in one and a half times more than the world average. The most popular was a modular backdoor for Android Triada, arranged for him Lokibot and Hiddad.
Unauthorized mining are struggling, many technology companies — recently, a function for blocking malicious software added Yandex.Browser.
To protect browser engineers have applied the algorithm of analysis of the load on the CPU and a function of blocking mining scripts. If the inspection confirms the presence of the script, the browser will block it. The website will continue but the miners will not be able to use the power of the device for the production of coins.
Subscribe to our channel in the Telegram, where it’s warm. Because of Asimov.