Coinhive Miner Emerges as the 6th Most Common Malware
The cryptocurrency miner Coinhive (Detected by Trend Micro as HKTL_COINMINE) made news in September after it was discovered that the EITest campaign was using it to trick victims into either paying for their services or handing out financial data via tech support scams. However, a new report reveals Coinhive's reach after it ranked the coin miner as the 6th most common malware in the world.
While cryptomining malware still lack the notoriety and visibility of other malware such as ransomware, this report proves that it is growing rapidly. One of the main attractions of cryptocurrency mining malware is that they are stealthy and often non-intrusive. The resulting decreased performance and latency can be annoying, but users are unlikely to find out that a miner like Coinhive is the cause. In addition, these types of malware present a great opportunity for profit, as each infected system essentially becomes a personal cryptocurrency miner for the attacker.
Defending against Coinhive
Regularly patching and updating software—especially web browsers—is a good idea in general, as it can mitigate the impact, not only of cryptocurrency malware but other malware that exploit vulnerabilities in a system
Users should also look into effective security solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security, which protect end users and businesses from threats by detecting and blocking malicious files and all related URLs. Trend Micro™ Smart Protection Suites deliver several capabilities like high fidelity machine learning, web reputation services, behavior monitoring and application control that minimize the impact of this cryptocurrency miners and other threats.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: Trigona
- Steering Clear of Security Blind Spots: What SOCs Need to Know
- Understanding the Kubernetes Security Triad: Image Scanning, Admission Controllers, and Runtime Security
- Preempting Threats to Connected Cars: The Importance of Cybersecurity in a Data-Driven Automotive Ecosystem
- Your Stolen Data for Sale