IPhones Increasingly Vulnerable to Coinhive Cryptomining Malware

  /     /     /  
Publicated : 23/11/2024   Category : security


IPhones Increasingly Vulnerable to Coinhive Cryptomining Malware


In their most recent Global Threat Index, Check Point researchers found a 400% increase in Coinhive attacks against iPhones by bad actors using the popular cryptomining malware.



Apples iPhones are increasingly becoming a target of bad actors using the popular Coinhive malware designed to steal CPU cycles to illegally mine for cryptocurrencies, according to researchers at Check Point.
In the cybersecurity solution providers most recent
Global Threat Index
, the researchers found an almost 400% increase in cryptomining attacks against iPhones, particularly during the last two weeks of September.
The rise in attacks on the Apple smartphone coincided with a significant increase in attacks against people using the Apple Safari browser.
The researchers found that were unsure of the reason behind the growth in attacks against the iPhone and noted that the attacks arent using new functionalities in the campaigns. However, the attackers are using Coinhive, which was first seen in September 2017 and has been atop Check Points index since December. Coinhive is the most popular malware for cryptomining, which itself has become the most dominant threat against enterprises since late last year, overtaking ransomware.
(Source:
iStock
)
In a blog post outlining the findings in Check Points index, researchers wrote that the increased attacks on iPhones serves to remind us that mobile devices are an often-overlooked element of an organizations attack surface. Its critical that mobile devices are protected with a comprehensive threat prevention solution, to stop them being the weak point in corporate security defenses.
In an email to Security Now, Omer Dembinsky, Check Points team leader for products R&D and data research, wrote that that cryptomining activity has been witnessed in the past on Apple devices (although in lower volumes), and it is by no means immune to these type of attacks. It is true that many of the mobile cyber threats are more targeted towards Android, but as cyber criminals are always looking for ways to expand their reach, it is very possible to see these types of sudden spikes if a specific effort is done by the attacking side.
The reach of Coinhive continues to be strong. The analysts found that the mining malware now impacts 19% of organizations around the world, a status that was accomplished in just over a year. The popularity of the malware comes in part from efforts to get the name into the market, Dembinsky said. (See
Cryptomining Malware, Cryptojacking Remain Top Security Threats
.)
Coinhive was the first brand of cryptominer to make a name for itself, and as such is many times the default choice by threat actors, he wrote.
Cryptoloot is another mining malware that is emerging as a competitor to Coinhive. Like other cryptomining malware, Cryptoloot uses the CPU or GPU power of a victims system and resources that reside in it to mine for cryptocurrencies like Bitcoin, Monero and Ethereum. The researchers wrote that Cryptoloot is trying to pull the rug under [Coinhive] by asking a lower percentage of revenue from websites.
The Cryptoloot strategy was the same since the beginning as part of trying to compete in the field, Dembinsky told Security Now. The situation is very similar to many markets where there is a strong product (Coinhive in this case) and the others try to employ different strategies to compete.
Coinhive and Cryptoloot were not the only mining malware in Check Points list of the Top 10 most wanted malware. Also included on the list were:
JSEcoin, a JavaScript miner that can be embedded in websites. In return for letting the miner run on their systems, JSEcoin enables users to have an ad-free online experience and to gain in-game currency, according to the researchers.
XMRig, an open source software that steals CPU power to mine Monero. It was first seen in the wild in May 2017.
Trojans aimed at financial institutions also were popular on Check Points list. Included in the Top 10 was Ramnit, a banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data, and Emotet, a Trojan that targets Windows-based systems and attacks customers of certain bands. It uses various APIs to monitor and log network traffic, then create a Run key registry entry to get started once the system reboots, according to researchers.
Ramnit and Emotet are examples of the rising popularity of banking Trojans among threat actors. Researchers with Proofpoint and Kaspersky Lab in separate reports noted a rise in the use of banking Trojans, with Proofpoint analysts saying banking Trojans were the most popular type of malware in the second quarter, accounting for 42% of malware the company had detected. (See
DanaBot Banking Trojan Is Now Finding Its Way to the US
.)
Related posts:
Kronos Returns as Banking Trojan Attacks Ramp Up
Banking Trojans on the Rise in Q2, Kaspersky Report Finds
BackSwap Banking Trojan Shows How Malware Evolves
Betabot Trojan Reborn in New Sophisticated Form
— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
IPhones Increasingly Vulnerable to Coinhive Cryptomining Malware