CONTACT US
  • Home
  • Services
  • Partners
  • News
  • About Us
  • Contact Us
01732 525945 hello@venturauk.com
cryptocurrency.jpg
July 18, 2021 0


As the price of cryptocurrency increases so does the volume of illicit mining detected in the wild, researchers say. 

Cryptocurrency has become a favored means for many threat actors to monetize cyberattacks. While, perhaps, the most well-known application of crypto including Bitcoin (BTC), Ethereum (ETH), and Monero (XMR) in the criminal realm is when ransomware payments are made, more covertly, cryptocurrency mining is also a problem. 

Cryptocurrency mining malware, when deployed on PCs or unsecured servers, quietly siphons away computing resources to generate virtual currency which is then sent to wallets controlled by its operators. 

Also known as cryptojacking, the most common forms of this malware — which may start out as legitimate programs before being twisted for criminal purposes — in the wild include Coinhive, Jsecoin, XMRig, and Cryptoloot. 

Cyberattackers will look for the best returns for their time, and in an examination of the topic published on Wednesday, researchers from Cisco Talos attempted to define the links between cryptojacking rates and cryptocurrency prices. 

Monero was chosen as the cryptocurrency of interest and cryptomining activity for this coin, against its value, between November 2018 and June 2021, was analyzed.

“Monero is a favorite for illicit mining for a variety of reasons, but two key points are: It’s designed to run on standard, non-specialized, hardware, making it a prime candidate for installation on unsuspecting systems of users around the world, and it’s privacy-focused,” the researchers say.

Talos notes that while the value of this cryptocurrency has fluctuated over the years — indeed, like many others — its price increased from late 2020 to now, when it has experienced a pullback. 

The researchers then applied network-based cryptojacking detection tools which monitored Monero in millions of events associated with cryptocurrency mining. 

According to the team, not only were they “floored” to see how much more common cryptojacking is since 2018, but also, outside of the price drop in early 2021, “the graph tracks almost identically to the value of the currency.”


Cisco Talos

“This was honestly a pretty surprising correlation since it’s believed that malicious actors need a significant amount of time to set up their mining operations, so it’s unlikely they could flip a switch overnight and start mining as soon as values rise,” Talos says. “This may still be true for some portion of the threat actors deploying miners, but based on the actual data, there are many others chasing the money.”

However, considering crackdowns on cryptocurrency mining and trading around the world, if the cryptojacking environment becomes more difficult or less lucrative, it is entirely possible that threat actors will turn their attention to the next big thing. 

“Detection for cryptomining can be spread into a variety of different places including blocking mining-related domains, to enforcing limitations on the end system preventing the mining from starting and lots of network-based detection, which this research is based on,” Talos says. “Regardless of the detection point, organizations should be working to prevent it.”

Previous and related coverage


Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0




Source link

SHARE THIS POST

RELATED POSTS

A major infrastructure shift is underway. AI could double the strain or solve it

June 4, 2025

  News summary: Architectural shift already underway: Cisco research shows 97% of IT leaders see modernized networks as critical...

by admin

New IBM CEO Study Reveals UKI Leaders Are Actively Embracing Agentic AI to Supercharge Business Growth

June 3, 2025

• Almost two thirds of CEO respondents in the UK and Ireland (65%) say their organisation is actively adopting AI...

by admin

Cisco Duo Reimagines Identity Security to Combat AI Era Threats

May 28, 2025

  News Summary: Cisco Duo unveiled an innovative, security-first Identity and Access Management (IAM) solution. Duo IAM protects...

by admin

FSQS Registered

Ventura Business Systems (UK) Ltd has satisfied all requirements to become fully registered on the FSQS supplier qualification system, as set out by the participating buying organisations.

Privacy Policy SiteLock

Copyright © 2024. All Rights Reserved by Ventura Business Systems (UK) Ltd