According to Atlas VPN research, cryptocurrency miners were the most common malware family discovered on devices in the first half of 2021, with 74,490 such threats discovered in a process dubbed “cryptojacking.”
The act of mining cryptocurrency on another person’s computer without their permission is known as cryptojacking. It usually happens when a victim unwittingly downloads cryptocurrency miner malware through a phishing link, a fraudulent website, or a software installation, giving the criminals access to the victim’s device.
Crypto-mining malware is a perpetually profitable cyberattack because it is difficult to detect on victims’ devices. Furthermore, cryptocurrency’s anonymity makes it simple for malicious hackers to profit from their victims without being detected.
Trend Micro’s Attacks from All Angles: 2021 Midyear Cybersecurity Report provided the data. The study focuses on potentially dangerous flaws in a wide range of devices and operating systems, as well as attacks aimed at exploiting them.
The sole purpose of malware is to mine cryptocurrency.
Crypto miners of various types aid hackers in converting computers into automatons whose sole purpose is to generate more cryptocurrency.
MalXMR was the most active cryptocurrency miner in the first half of 2021, with 44,587 detections. MalXMR is a crypto-mining malware that uses Windows Management Instrumentation and spreads via EternalBlue (WMI).
Coinminer was the second most frequently detected program in H1 2021, with a total of 8,533 detections. Coinminer is frequently found on Android phones in phony versions of well-known apps obtained from unofficial sources.
Crypto miners have been discovered in Google Play Store apps as well. The infected device may overheat, charge slowly, or display other signs of resource overuse.
Data breaches and hijackings put victims at risk.
ToolXMR, a crypto miner that mines Monero coin and is typically sent by other malware via remote locations, was discovered 6,419 times. It mines cryptocurrency using the CPU and GPU resources of the device’s system, making it extremely slow to operate.
Finally, cryptocurrency-mining malware has made it easier for hackers to profit from their activities. Victims of cyberattacks are more vulnerable to data theft, hijackings, and other cyberattacks in the future due to higher power costs and poorer device performance.