Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises

  /     /     /  
Publicated : 22/11/2024   Category : security


Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises


Attackers looking to hijack systems for illegally mining digital currencies have begun eyeing business systems, security vendors say.



In an ominous trend for businesses, hijacking computers for cryptocurrency mining appears to have become
the
go-to strategy for cybercriminals looking for a safe and reliable way to generate illegal revenues.
Several vendors in recent days have reported a huge surge in illegal crypto-mining activity involving millions of hijacked computers worldwide. Professional cybercriminals are moving away in droves from less profitable exploits to making money via the surging global interest in digital currencies, said Digital Shadows in the
latest warning
on this trend.
The activity has begun to pose as much of a threat to businesses as it does to consumers. Security vendor CrowdStrike
recently reported
that it had seen multiple instances of businesses being impacted by illegal crypto-mining activity. In some cases, mining tools installed illegally on business systems have caused applications and hardware to crash, causing operational disruptions lasting days and sometimes even weeks, says Bryan York, director of services at CrowdStrike.
Weve seen an uptick in unauthorized crypto-mining, or cryptojacking, targeting businesses, he says. While cryptocurrency mining has typically been viewed as a nuisance, weve recently seen several cases where mining has impacted business operations, York warns.
Mining 101
Crypto mining is a fairly complex process where a computers processing resources are used for blockchain transaction verification. Mining is a very CPU-intensive, resource-hogging activity and some digital currencies like Bitcoin require special-purpose hardware to do it. Several other digital currencies like Monero, Zcash, and Ethereum, however, can also be mined by pooling the resources of multiple computers. 
In return for installing a mining tool and allowing their computer resources to be pooled for mining, the miners or owners of the computers, receive digital coins in return. Mining itself is a legal activity, and many people around the world allow their systems to be used for the purpose in hopes of making some money on the side.
In recent months, however, cybercriminals have begun surreptitiously installing crypto-mining tools on victim computers and using resources of those compromised systems for the same purpose. Instead of taking over computers to steal data or install ransomware, cybercriminals have simply begun stealing system resources and using this to illegally profit from digital currency mining.
These attacks are much stealthier than their predecessors, Ciscos Talos threat group said in a
report
this week. Attackers are not stealing anything more than computing power from their victims and the mining software isnt technically malware.
When installing mining software, some criminals have even begun putting limits on things like CPU usage and amount of cores being used to ensure users dont notice any obvious performance hit as result of mining software running on their system. In theory, victims could remain part of the adversary botnet indefinitely, Talos said in its report.
E-Currency Theft
Illegal crypto-mining is just one form of cryptocurrency fraud. Cybercriminals have also begun stealing tens of millions of dollars directly from electronic wallets used to store digital currency, as well as targeting cryptocurrency exchanges and trading platforms. Michael Marriott, research analyst at Digital Shadows, points to one recent incident where criminals targeted the Initial Coin Offering for blockchain application company Experty and used phishing emails to trick potential coin buyers to send funds to an attacker-owned wallet.
In another incident just this week, thieves emptied a staggering $500 million from Japans Coincheck cryptocurrency exchange.
However, illegal mining - especially for Monero - has quickly emerged as one of the most reliable and safe ways for cybercriminals to profit from the cryptocurrency craze. Using the Monero cybercurrency as an example, Talos has estimated that a threat actor using 2,000 hijacked computers can generate $500 per day, or $182,500 per year. There are some botnets with millions of infected systems that criminals can leverage to generate more than $100 million from cryptocurrency mining, according to Talos.
Driving the trend is the easy availability of do-it-yourself kits that almost anyone can use for illegal mining. Criminals can rent mining botnets for as little as $30 to $130 per month, and software for distributing miners for as little as $29, according to Digital Shadows.
Weve seen plenty of actors changing their focus to profit from this, says Marriott from Digital Shadows. For example, the ransomware variant known as VenusLocker switched its business model to mine bitcoin rather than encrypt files on victims computers. Similarly, the RIG exploit kit has incorporated Monero mining into its features, he says. 
Satori, a botnet associated with DDoS attacks, has also recently begun targeting cryptocurrency mining, as has Smominru, a botnet that has infected over 500,000 systems and already generated some $3 million in Monero, Marriott says.
Attackers have also begun searching on sites such as GitHub for keys to cloud services such as AWS in order to use cloud-based machines to mine cryptocurrencies, he notes. If attackers have access to an organizations cloud services, then as well as performing mining activity, they could realistically do other malicious acts, such as stealing data or installing malware payloads, Marriott says.
WannaMine
CrowdStrike has observed crypto-mining attacks within the education, entertainment, financial, healthcare, insurance, and technology sectors, says York. Some of the tools used in the attacks pose a particular threat to enterprises. One example, he says, is WannaMine, a crypto-mining worm that uses sophisticated propagation and persistence methods to spread and remain on systems, he says.
WannaMine propagates more effectively within a corporate network than it would on consumer network, he notes.
 
It uses the Mimikatz credential-harvester to acquire credentials and move laterally within organizations using the legitimate credentials. If unsuccessful, WannaMine attempts to exploit the remote system with the EternalBlue exploit used by WannaCry in early 2017. This approach is generally more effective in corporate networks, he says.
Nick Biasini, a threat researcher at Cisco Talos, says organizations that arent already looking for miners on their infrastructure definitely should be. This is a huge new wave of threats that is being delivered to systems in virtually every way possible, he says.
Some examples include phishing websites and rogue browser extensions. 
Performance degradation is one sign of the activity, he says. A compromised system also periodically reaches out to the broader infected pool with which it belongs, so monitoring network activity is critical. [But] it is important to note that attackers can throttle resource usage or only mine during off-hours to make it much more difficult to detect, Biasini adds.
Related Content:
Hack Costs Coincheck Cryptocurrency Exchange $530 Million
New Cryptocurrency Mining Malware Has Links to North Korea
Cybercriminals Employ Driveby Cryptocurrency Mining
5 Reasons Why the CISO Is a Cryptocurrency Skeptic
 

Last News

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises