Cryptocurrency News

According to CheckPoint, crypto miners are the most wanted malwares in April 2019

Published

on

The leading cybersecurity firm Check Point Software Technologies LTD., Has published through its research subsidiary a report where it has made public the global threats for April 2019, in which the malwares associated with cryptocurrency mining take all three positions honorary.

Also the report highlights the return to the list of the banking Trojan ‘Trickbot', a popular option among cybercriminals in the past and that has returned to the scene. The multi-purpose banking Trojans like this one allows the cyberdelicuentes financial gains through banking platform.

The increase in use of this Trojan had its highest moment on April 15, date coinciding with the payment of taxes online in the United States, spreading through Excel files that download the Trickbot and is distributed by networks and banks.

The three most common malware variants of the past month were cryptominers, the remaining seven of the top ten are multi-trojan trojans.

The three most wanted malicious programs of April 2019 were:

  • Cryptoloot, uses the power of the CPU or GPU of the victim and the existing resources for the extraction of crypts, adds transactions to the blockchain and releases new currencies. Originally a competitor of Coinhive.
  • XMRig: open source CPU mining software used to exploit the Monero cryptocurrency, which was first seen in May 2017.
  • Jsecoin: JavaScript miner that can be embedded in websites. With JSEcoin, you can run the miner directly in your browser in exchange for an experience without advertising, in-game money and other incentives.

Despite its prevalence, the company's researchers believe that criminals are diverting their focus from crypto mining. Several popular services used to attack users such as Coinhive, have closed coupled with the low performance of cryptocurrency prices.

In counterpart, Check Point indicates that trojans multipropositos have been increasing, by the way they steal private data and it is easier to request attractive rewards for blocking them.

Maya Horowitz, director of research and threat intelligence at the company said:

“As this malware is constantly changing, it is crucial to have a strong defense line against them with advanced threat prevention.”

The company also released a list of the three most wanted mobile malwares in April, with Triada leading the list for its damage to Android systems and the report concludes with the three most exploited vulnerabilities of the previous month that affect 44% of organizations at the same level. world.

Click to comment

Trending

Exit mobile version