Connect with us

Hi, what are you looking for?

World

NSA leak fuels rise in hacking for crypto mining: report

-

Illicit cryptocurrency mining has been surging over the past year, in part due to a leaked software tool from the US National Security Agency, researchers said Wednesday.

A report by the Cyber Threat Alliance, an association of cybersecurity firms and experts, said it detected a 459 percent increase in the past year of illicit crypto mining -- a technique used by hackers to steal the processing power of computers to create cryptocurrency.

"Activity has gone from a virtually non-exist issue to one that almost universally shows up at the top of our members' threat lists," said a blog post by Neil Jenkins, chief analytic officer for the alliance.

One reason for the sharp rise was the leak last year by a group of hackers known as the Shadow Brokers of "EternalBlue," software developed by the NSA to exploit vulnerabilities in the Windows operating system.

"A patch for EternalBlue has been available for 18 months and even after being exploited in two significant global cyberattacks -- WannaCry and NotPetya -- there are still countless organizations that are being victimized by this exploit, as it's being used by mining malware," Jenkins wrote.

The rise in hacking coincides with growing use of virtual currencies such as bitcoin, ethereum or monero, which are not regulated by any government and are created through solving complex computing problems.

While some cyptocurrency mining is legitimate, hackers have discovered ways to tap into the processing power of unsuspecting computer users to illicitly generate currency.

Jenkins said the rise in malware for crypto mining highlights broader cybersecurity threats.

"Illicit mining is the 'canary in the coal mine' of cybersecurity threats," he said. "If illicit cryptocurrency mining is taking place on your network, then you most likely have worse problems and we should consider the future of illicit mining as a strategic threat."

Hackers can generate gains and use cryptocurrency for other malicious purposes such as purchasing other kinds of malware tools on the "dark web," according to the report.

The researchers said 85 percent of illicit cryptocurrency malware mines monero, with bitcoin representing eight percent.

"Although monero is significantly less valuable than bitcoin, several factors make this the cryptocurrency of choice for malicious actors," the report said.

Monero, according to the report, offers more privacy and anonymity, "which help malicious actors hide both their mining activities and their transactions using the currency," the researchers said.

"Transaction addresses and values are obfuscated by default, making tracking monero incredibly difficult for investigators."

Illicit cryptocurrency mining has been surging over the past year, in part due to a leaked software tool from the US National Security Agency, researchers said Wednesday.

A report by the Cyber Threat Alliance, an association of cybersecurity firms and experts, said it detected a 459 percent increase in the past year of illicit crypto mining — a technique used by hackers to steal the processing power of computers to create cryptocurrency.

“Activity has gone from a virtually non-exist issue to one that almost universally shows up at the top of our members’ threat lists,” said a blog post by Neil Jenkins, chief analytic officer for the alliance.

One reason for the sharp rise was the leak last year by a group of hackers known as the Shadow Brokers of “EternalBlue,” software developed by the NSA to exploit vulnerabilities in the Windows operating system.

“A patch for EternalBlue has been available for 18 months and even after being exploited in two significant global cyberattacks — WannaCry and NotPetya — there are still countless organizations that are being victimized by this exploit, as it’s being used by mining malware,” Jenkins wrote.

The rise in hacking coincides with growing use of virtual currencies such as bitcoin, ethereum or monero, which are not regulated by any government and are created through solving complex computing problems.

While some cyptocurrency mining is legitimate, hackers have discovered ways to tap into the processing power of unsuspecting computer users to illicitly generate currency.

Jenkins said the rise in malware for crypto mining highlights broader cybersecurity threats.

“Illicit mining is the ‘canary in the coal mine’ of cybersecurity threats,” he said. “If illicit cryptocurrency mining is taking place on your network, then you most likely have worse problems and we should consider the future of illicit mining as a strategic threat.”

Hackers can generate gains and use cryptocurrency for other malicious purposes such as purchasing other kinds of malware tools on the “dark web,” according to the report.

The researchers said 85 percent of illicit cryptocurrency malware mines monero, with bitcoin representing eight percent.

“Although monero is significantly less valuable than bitcoin, several factors make this the cryptocurrency of choice for malicious actors,” the report said.

Monero, according to the report, offers more privacy and anonymity, “which help malicious actors hide both their mining activities and their transactions using the currency,” the researchers said.

“Transaction addresses and values are obfuscated by default, making tracking monero incredibly difficult for investigators.”

AFP
Written By

With 2,400 staff representing 100 different nationalities, AFP covers the world as a leading global news agency. AFP provides fast, comprehensive and verified coverage of the issues affecting our daily lives.

You may also like:

World

Let’s just hope sanity finally gets a word in edgewise.

World

Tycoon Morris Chang received one of Taiwan's highest medals of honour to recognise his achievements as the founder of semiconductor giant TSMC - Copyright...

World

An Iranian military truck carries a Sayad 4-B missile past a portrait of supreme leader Ayatollah Ali Khamenei during a military parade on April...

World

Iranians lift up a flag and the mock up of a missile during a celebration following Iran's missiles and drones attack on Israel, on...