Story image

Cryptomining malware a genuine threat to organizations, NTT Security says

12 Mar 2018

NTT’s Global Threat Intelligence Center suspects that cryptocurrency mining malware may set its sights on organisations as the demand for cryptocurrency swells to unprecedented heights.

Cryptocurrency investment is not a new phenomenon but it has peaked significantly since late 2017, NTT says. As cryptocurrency values fluctuate wildly, this has led to the development of cryptocurrency mining (cryptomining) malware designed to generate revenue for cyber threat actors.

NTT Security has visibility into 40% of global internet traffic and a variety of threat intelligence sources. It found that criminals are using phishing emails to target a system. An infected system is then used to mine XMR cryptocurrency using the victim’s resources.

According to an NTT Security white paper, the average Windows PC can run 50 or more processes at any one time, which puts strain on CPU use. However if shutting down some of those resources still results in high CPU usage, the problem count be related to cryptomining.

Cryptomining can increase electricity usage, slow down device performance, and may affect brand reputation.

There are more than 12,000 Monero mining malware samples, with the earliest dating back to 2015. However, 66% of those samples were submitted between November and December 2017.

NTT Security threat research analyst Terrance DeJesus says that as digital currencies are adopted as part of moneymaking ventures, cybercriminals are overcoming barriers and taking profits for themselves.

“Monero mining malware is installed on the victim’s computer or smartphone without their knowledge and, once installed, it uses the victim’s computing resources and electricity supply to mine cryptocurrencies. And the rewards go directly to the hacker, not the owner of the computer. Device owners might not suspect a thing,” DeJesus says.

While phishing emails are the most common ways or infecting systems, the discovery of coin miners in a network could suggest that there are other threats lurking. These threats could include backdoors and unpatched vulnerabilities.

“Organizations mustn’t ignore the threat of mining malware. The impact of an attack can go well beyond performance issues. Mining costs organizations money, impacts the environment and causes reputational damage. It could also be indicative of more problems in the network,” DeJesus explains.

“The use of coin miners will, without a doubt, grow and become more advanced in time, possibly being built into other malware types such as banking Trojans, as well as ransomware. There are serious business implications to ignoring this current threat. We are encouraging all organizations to be more vigilant of cybersecurity threats to their business. There are often simple and effective ways to mitigate risks, but too often the most obvious things are overlooked.”

NTT Security suggests that organisations mitigate cryptomining malware risks by:

  • Conducting regular risk assessments to identify vulnerabilities in the organization.
  • Adopting a defense-in-depth approach to cybersecurity — i.e., have multiple layers of security in place to reduce exposure to threats.
  • Regularly updating systems and devices with the latest patches, and deploy intrusion, detection and prevention systems to stop attacks.
  • Educating employees on how to handle phishing attacks, suspicious email links, and unsolicited emails and file attachments.
  • Proactively monitoring network traffic to identify malware infection, and pay close attention to the security of mobile devices.
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.