While stealing sensitive corporate data makes headlines, recent study suggests that many hackers choose to install cryptominers on hacked endpoints for a quick, straightforward, and seemingly innocuous reward.
Cryptominers were the most common malware family in 2021, according to a survey by Atlas VPN and Trend Micro, with 150,909 detections.
Cryptocurrencies like bitcoin and ether require a lot of processing power, an active internet connection, and a lot of electricity to “mine.” Crooks have figured out how to install bitcoin miners on infected devices and have all of the transactions forwarded to their own wallet address.
Choosing a business to target
A cryptominer will frequently render the gadget inoperable, in addition to racking up the victim’s electrical bill.
Malware was most often targeted at information and communication organizations, with 561,753 malware files discovered in emails addressed to sector personnel. With 397,072 weaponized emails sent, retail came in second, followed by the construction industry with 356,952.
The financial and manufacturing businesses were at the bottom of the list, obtaining “just” 198,408, and 188,373 malware files, respectively.
Despite their relative prominence, cryptominers are far from the only malware that is being spread. Web shell scripts were found 149,290 times, allowing attackers to access sensitive material or launch a ransomware assault.
In 2021, the Ulise virus was detected 145,321 times, while WannaCry was detected 97,585 times.
“Attackers may benefit from enterprises quickly and easily through malware assaults. Cyberattack victims are more exposed to data theft, hijacking, and other types of assaults in the future, according to Vilius Kardelis, a cybersecurity writer at Atlas VPN.
“Businesses may reduce malware attack risks by using appropriate cybersecurity strategies and applications.”
To read our blog on “Cryptocurrencies are increasingly being avoided by NFT merchants,” click here.