Sydney, AUSTRALIA, August 29, 2018 – Trend Micro Incorporated, a global leader in cybersecurity solutions, today released its Midyear Security Roundup 2018, revealing that cybercriminals are moving towards more covert methods intended to steal money and valuable computing resources from consumers in Australia, flying under the radar as they use techniques like crypto-jacking to increase profits.
Crypto-jacking attempts are making the biggest impact so far this year. Globally, Trend Micro recorded a 96 per cent increase in cryptocurrency mining detections in 1H 2018 compared to all of 2017, and a 956 percent increase in detections versus 1H 2017. This indicates cybercriminals are shifting away from the quick payout option of hacking and stealing personal details, like credit card information, for the slower, behind-the-scenes approach of stealing computing power to mine digital currency.
“The recent change in the threat landscape mirrors what we’ve seen for years – cybercriminals will constantly shift their tools, tactics and procedures to more effectively recoup on their efforts, with lesser chance of being caught,” said Tim Falinski, APAC Senior Director, Consumer for Trend Micro.
“Attackers have changed their tactics to be more covert, using access points that consumers might not typically think of, let alone protect from cybercriminals. With ever-increasing numbers of devices in the home, no longer limited to just desktop computers and smartphones, Australians should put in the simple measures now to save future heartache.”
Cryptomining incidents from Coinminer, a cryptojacking virus, have risen by almost one-third (31 per cent) alone between Q1 and Q2 in Australia, while vulnerabilities in banking and apps continue to be an increasing problem as cybercriminals look for new ways to exploit consumer technology. Globally, banking saw 172,170 vulnerabilities this year, while more than three million malicious apps were detected.
“While cybercriminals still see big business as big money, every day consumers are still a major target and one that is often less prepared to manage threats than a large organisations. They are now shifting to more covert methods that may go unnoticed, like a script in the background rather than unauthorised charges on your credit card,” continues Mr Falinski.
“Many consumers are still under the impression mobile devices and their apps are not vulnerable to digital security threats, and will protect them. This year we’ve seen Apple bugs again on the rise, busting that myth, and reinforcing need for consumers to be proactive about their cybersecurity, especially the basics like updates.”
Staying conscious of devices around the home is essential to keeping threats at bay. Even technology like routers can be exploited if not properly secured, as many people do not change the basics like the default password. Consumers should take note of all their devices, existing security products and keep an eye out for anything out of the unusual.
Trend Micro’s leading threat intelligence collected over 30 years of business allows comprehensive protection, blocking more than 20 billion threats so far this year and counting.
For a complete look at the Midyear Security Roundup 2018, please visit: https://www.trendmicro.com/vinfo/au/security/research-and-analysis/threat-reports/roundup/unseen-threats-imminent-losses
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centres, cloud environments, networks and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defence with centralised visibility and control, enabling better, faster protection. With nearly 6,000 employees in more than 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organisations to secure their journey to the cloud. For more information, visit www.trendmicro.com.au.
All product and company names herein may be trademarks of their registered owners.