Cryptojacking attacks pose an internal and external threat as hacking groups become more organized when trying to exploit network vulnerabilities. However, there are also cases where some administrators use valid rights to make money illegally mining cryptocurrencies using the company’s network resources, and many organizations have “not much visibility,” said Josh Lemos, vice president of research and intelligence. from BlackBerry.
Lemos told Cointelegraph that crypto-mining software is not necessarily malicious, but rather opportunistic and uses computer resources to make money, “although it is often paired with malicious software” It is a fact that some organizations are not watching well enough to protect their networks.
Any cryptojacking malware can be dangerous
Current cryptojacking cases like Lucifer show a pattern: the frequent use of the XMRig crypto mining app for attacks. The BlackBerry manager explained why Monero (XMR) is used frequently in attacks and not in other currencies:
“”Monero is presented as more lucrative for the average user due to the nature of the mining algorithm. Every time you have uneducated users looking for quick cash, you have more options to use. The old adage is still true: the best way to get rich in a gold rush is to sell shovels. In this case, the blades also contain malware. “
Does the pandemic lead to cryptojacking attacks?
Lemos believes that hackers use extensive malware suites with features that exploit numerous vulnerabilities to create persistence. This shows a growing trend for this type of cryptojacking attack, and Lucifer is “a continuation or evolution of this trend”.
With the COVID-19 pandemic still active in several countries, Lemos claims that while cryptocurrencies are seen as a “valuable alternative investment”, the upward trend in crypto-jacking attacks “stays here” as it is not to specifically accuse the jump related to the coronavirus.