Connect with us

Hi, what are you looking for?

HEADLINES

OPINION | Defeating cryptojacking

David Maciejak, Director of Security Research, Fortinet

By David Maciejak, Director of Security Research, Fortinet

Cryptojacking is a new step in the evolution of malware monetisation methods.

One of the first successful monetisation formulas was banking malware, where banking credentials were communicated back to cyber criminals. However the conversion of credentials into cash is not an easy one.

Ransomware was another step that made the process simpler − victims would wire money directly to the cybercriminals. However, ransomware is losing its effectiveness as more computer users become aware of the threat, and improve their security and backup procedures.

Cryptojacking has one main advantage over these two monetisation methods − if well designed, the mining process can run in the background without drawing attention to itself. In the best case, the user will be unaware that there is any extra processing going on. This makes it almost a “victimless crime” in the sense that the user may not be aware that there is a problem, as opposed to having a computer visibly disabled, losing precious documents, or having money stolen from bank accounts.

Advertisement. Scroll to continue reading.

The downside for cybercriminals hoping to profit from cryptojacking is that many victims are needed to gain enough resources to make significant profits. Ultimately, that will be the factor that decides whether cryptojacking will continue as an attack vector, or whether its popularity will wane as new techniques are found, and the malware evolution continues.

How should organisations tackle new and evolving forms of attack like cryptojacking?

Deciding on the right approach to cyber security is essentially a risk management process.

Organisations need to conduct detailed reviews covering the assets that may be at risk, the protection mechanisms in place, and the potential damage to the company should those assets be stolen or destroyed. Assets may be information-based (files, credentials or databases) or, as more devices such as video cameras and physical security access systems become connected to the corporate network, physical property.

The damage to firms in the event of an attack may be difficult to assess. Monetary losses from paying off ransomware attacks are easy to determine, but things like document loss,  related recovery costs,  reputational damage and legal liabilities caused by loss of customer data are harder to quantify.

Advertisement. Scroll to continue reading.

Cryptojacking losses are likewise tough to put a finger on. Servers which are mining in the background will have reduced resources for dealing with real work, affecting business productivity. Customer experience on public-facing servers can also be degraded.

These losses, whilst difficult to value, can be substantial and it becomes more important than ever to put in place a complete security solution covering all parts of an organisation’s network, from the access to the cloud. This solution should not only protect against attacks, but also continually monitor the security “health” of the network to identify potential weak points, and pinpoint and deal with breaches before real damage is done.

 

 

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Trend's 2025 predictions report warns of the potential for malicious "digital twins," where breached/leaked personal information (PII) is used to train an LLM to...

HEADLINES

The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture...

HEADLINES

In rigorous evaluations conducted by prestigious cybersecurity testing organizations, Kaspersky Plus (starting in Q4 2024, Kaspersky Premium), Kaspersky Endpoint Security for Business (KESB), and...

HEADLINES

"Given the Philippines' high exposure to cyber threats, it's important for both individuals and businesses to stay vigilant," said Adrian Hia, Managing Director for...

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

The partnership enables MCU to integrate Fortinet’s Network Security Expert (NSE) training and certification program into its academic offerings, either as part of the curriculum or...

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

Advertisement