You Should Be Worried About Cryptocurrency Mining Malware

December 3, 2018

Written by wukovits

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system.

It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.  However, that’s not much of a direct threat.  As such, relatively few resources are put toward dealing with such infections.  They simply tend to be given a lower priority.

That’s almost certainly a mistake for a couple of different reasons:

First, the amount of computing power this type of malware eats up can be quite severe. In some cases, it utilizes up to fifty percent of the infecting computer’s processing power, which as you might expect, can dramatically impact system performance.

Second, and more troubling and problematic, is that the mining software establishes a beachhead on your network.  Once any type of mining software is installed and running on a target system, it’s in communication with the hackers’ command and control server.  Anytime the hackers choose to, they can use that connection to install more damaging malware on the target system, including keyloggers, scrapers, ransomware and the like.

Even worse, hackers can use their toehold inside your network to infect any other device that the initially infected PC is connected to on your network, which means that very quickly, you could go from having a single infected PC to having a network wide problem that can bring your company to its knees.

The bottom line is simply this:  Cryptojacking may not appear overly dangerous on the surface, but if they’re not dealt with quickly and decisively, they could open the door to much more significant issues.  Make sure your IT staff is giving these types of infections the attention they deserve.

Used with permission from Article Aggregator

Related Articles

Some Amazon Device Features May Have Security Risks

Have you heard of Amazon Sidewalk? If not, it's definitely something you should be aware of. Depending on your point of view, the new feature, which was enabled by default on a wide range of Amazon devices by default on June 8 of this year (2021) is either...

Email Unsubscribe Scam Can Easily Fool Any User

Scammers are increasingly relying on a tried and true bit of social engineering to fool unsuspecting users into unwittingly signing up to receive a flood of additional spam email. They accomplish this by blasting out an email asking recipients if they wish to...

Update VMWare Software Immediately To Avoid Possible Attack

The US Cybersecurity and Infrastructure Security Agency recently issued a warning to all companies running VMware Vcenter Server and VMware Cloud Foundation. They are asking them to download and apply the latest security patches as soon as possible because attackers...

Send us a message

Your message was sent.

Thank you for contacting Bayou Technologies. We'll be in touch soon!

Need help? support-icon