Crypto Miners Dominate Top 10 List of Most Prolific Malware Threats

gepubliceerd op by Cointele | gepubliceerd op

A global threat report has concluded that the three most common malware variants detected in April were crypto miners, according to a news release on May 14.Check Point Research said Cryptoloot, malware that uses the victim's computing power to mine for crypto without their knowledge, was last month's biggest threat.

XMRig, open-source software which is used for mining monero, was in second place.

Rounding off the top three was JSEcoin, a JavaScript miner embedded in websites.

Despite their prevalence, the company's researchers believe that criminals are shifting their focus away from crypto mining.

Several popular services used to target unsuspecting computer users, such as Coinhive, have closed.

The collapse in crypto prices at the start of the year meant other strategies were more lucrative.

"As these malware constantly morph, it is crucial to have a robust line of defense against them with advanced threat prevention."

Last month, American software company Symantec detected a spike in a new crypto mining malware, Beapy, that targets enterprises.

Beapy is reportedly spread through malicious emails, and according to researchers, its file-based approach to cryptojacking is considerably more profitable for hackers than browser-based tools.

Two Romanian cybercriminals were convicted in the United States of spreading malware to steal credit card details and illicitly mine crypto.

x