Bitcoin… Blockchain… Cryptocurrency… and Now Cryptojacking!
I know what you’re thinking… I have nothing to do with these technologies, why should I care?
As of March 2018, the market cap for cryptocurrencies surpassed $264 billion and has become the new bull’s eye for cybercriminals.
And the bottom-line is… if you have a website, then you need to know how to protect your website and its visitors from hackers.
Cryptocurrency, Mining, and Cryptojacking 101
Nearly everyone has heard of the surge in value of cryptocurrencies such as Bitcoin, Ethereum, Monero, and Zcash. But what is the relevance of mining cryptocurrencies and how does it really affect me?
With regular money, there is a central bank that authorizes the issue of new notes and like any man-made system, it is prone to corruption.
Enter the world of digital money, aka cryptocurrency, designed to be absolutely secure and anonymous.
Cryptocurrencies allow users to make secure payments without having to go through banks.
Generated through a process known as ‘mining’, or cryptomining, transactions are verified and added to the blockchains (digital ledgers) to prevent deception, fraud, corruption, and the like.
The verification of these blockchains require serious CPU power to the extent of an entire warehouse with computers from floor-to-ceiling and the titanic electric bill that follows.
As payment for these huge costs, cryptominers are paid cryptocurrencies as fees by the merchants of each transaction.
Sounds pretty fair, right? Payment for services rendered.
Well it sounds pretty fair to cybercriminals too, minus the warehouse, minus the hardware, and minus the electric bill.
This is where you come in and this is where you get cryptojacked!
These cybercriminals target computers, servers, and networks, in order to mine for cryptocurrency using your resources such as websites, computers, and electricity.
Basically, you pay for the resources and they reap the financial benefits, to the tune of millions of dollars!
On April 4th, 2018, an unknown hacker attacked the Verge cryptocurrency platform. The attack lasted a miniscule three hours, but unofficially reported that the attacker stole a whopping $1,373,544. Since then, the firm has updated the system with a patch to prevent further exploitation.
How a Cryptojacker Infiltrates
There are several ways cryptojackers infiltrate a victim’s computer to secretly mine cryptocurrencies.
One way is to use phishing tactics in which a link is clicked that runs code for cryptomining script in the background.
To make matters even worse, now with in-browser cryptojacking, a program does not need to be installed. Once you visit this infected website, the script automatically executes malicious code.
Cryptojacking requires no download, starts immediately, and is completely unnoticeable.
The undetectable nature by which it performs makes it the new stealth bomber of the cyber threat industry.
In either case, the malicious code running stealthily on the victims’ computers, stealing CPU resources, and secretly mining cryptocurrencies for the hacker.
Danger to Website Owners and Their Visitors
Cryptojacking is dangerously effective and with the recent rise of Bitcoin, cybercriminals are redirecting their focus away from ransomware in favor of cryptocurrency mining.
Even Google is seeing a tremendous surge in Chrome extensions running cryptocurrency mining scripts.
In swift response, the Chrome Web Store is no longer accepting any extensions that run mining scripts extensions.
In its latest report, The U.K.’s National Cyber Security Centre, emphasizes cryptojacking as a “significant” concern.
The report noted that 55 percent of businesses worldwide suffered from cryptomining attacks last December.
The agency added that “we assume the majority of cryptojacking is carried out by cyber criminals, but website owners have also targeted visitors to their website and used the processing power of visitors’ CPUs, without their knowledge or consent, to mine cryptocurrency for their own financial gain.”
Therefore, once your webpage is identified as delivering cryptojacking scripts, whether intentional or not, you will face a number of issues, including blacklisting, customer mistrust, and revenue loss.
Massive Impact of Cryptojacking
The most recent quarterly report from Comodo Cybersecurity Threat Research Lab stated: “During Q1 2018, Comodo Cybersecurity detected 28.9 million cryptominers incidents”. Also noting that, “cryptocurrencies have become a favorite target of cybercriminals”.
Furthermore the report outlined the number of unique cryptominer variants grew from 93,750 in January to 127,000 in March, as shown in Fig. 1 below. At the same time, ransomware activity decreased 42% from 124,320 to 71,540 from January to March.
No one knows for certain how much cryptocurrency is mined through cryptojacking, but it definitely doesn’t require significant technical skills. According to the report from Digital Shadows, “The New Gold Rush Cryptocurrencies Are the New Frontier of Fraud”, cryptojacking kits are available n the dark web for as little as $30.
Is There a Cure for Cryptojacking?
Cryptojacking is clearly a significant concern for 2018 and the only way a user may notice their devices are being cryptojacked is a slowdown in performance.
Since this happens to most of us at one point or another, it will leave us questioning… have I been cryptojacked???
As these attacks are continuously evolving and still in their infancy, one of the better solutions would be real-time monitoring of your website.
Yet who has the time or the knowledge?
There are a few organizations with the network and the monitoring tools or the capabilities to analyze that information for accurate detection.
One such service is cWatch Web and it’s backed by human intelligence and a team of cybersecurity analysts. So don’t get cryptojacked! Protect yourself and your website with continuous monitoring and protection.
Don’t count on your existing endpoint protection tools to stop cryptojacking. Crypto mining code can hide from signature-based detection tools and desktop antivirus tools won’t see them.
And since you don’t have a help desk or can’t train your help desk to look for the signs, deploying a monitoring solution might be your best bet to detecting cryptomining activity.TEST YOUR EMAIL SECURITY