Botnets Are Being Repurposed for Crypto Mining Malware: Kaspersky
According to a security bulletin released by Kaspersky Lab, botnets are increasingly being used to deploy illegal encryption mining software.
In this memo, cyber security company analysts said the number of unique users attacked by cryptographers on Wednesday rose sharply in three months of 2018. These malicious codes are designed to secretly reallocate the processing power of an infected system into an optical encrypted call. Go to the attacker.
According to Kaspersky, more users were infected in September compared to last January and the "threat is still present". It is uncertain whether the recent decline in encryption market prices will affect infection rates.
The company's analysts said a significant reduction in distributed denial of service (DDoS) attacks could be "due to" rewriting "of botnets from DDoS attacks to CryptoCurrency mining.
"There is evidence that many renowned botnets owners have turned their attack vectors into mining. For example, the DDoS activity of Yoyo botnets has been largely dismantled, but there is no data to disassociate."
A possible explanation for the growing interest in cybercriminals' cryptography mining is the fact that it is difficult for victims and police to detect when malware is deployed.
Many of the different types of software that are identified and cataloged reassemble the computer's processor usage and allocate a small amount to the mining so that the user is not careful.
The organization concluded that regions lacking the legislative framework for illegally distributed software are likely to be victims of cryptanalysis and investigated why malicious code is more prevalent in the region than in other regions.
US users were the least affected by the attack and accounted for 1.33% of the total searches, followed by Swiss and UK users. However, countries using piracy laws such as Kazakhstan, Vietnam and Indonesia were on the list.
"The more unlicensed software is freely distributed, the more miners there are, as confirmed by our statistics, which show that miners often land on computers sacrificed with pirated software," the report said.
Images through Shutterstock
(f.fbq) return; n = f.fbq = function () n.callMethod?
n.callMethod.apply (n, arguments): n.queue.push (arguments); if (! f._fbq) f._fbq = n;
n.push = n; n.loaded =! 0; n.version = & # 39; 2.0 & # 39 ;; n.queue = ; t = b.createElement (e); t.async =! 0;
t.src = v; s = b.getElementsByTagName (e) ; s.parentNode.insertBefore (t, s)} (window,
Document, & # 39; script & # 39 ;, & # 39; // connect.facebook.net/en_US/fbevents.js');
fbq (& # 39; init & # 39 ;, & # 39; 239547076708948 & # 39;);
fbq (& # 39; track & # 39 ;, & # 39; PageView & # 39;);
You must log in to post a comment.