As cryptocurrency prices have soared in recent years, malicious cryptocurrency miners have increasingly targeted vulnerable computer systems with malicious crypto-mining software in search of profits. In a new research paper, security researchers at Microsoft, Northeastern University, and the University of California, San Diego have delved into the world of malicious cryptocurrency mining and examined various methods used by malicious miners.
The researchers found that malicious cryptocurrency mining is much more sophisticated than previously thought and identified a variety of different malicious mining techniques and operations. The most popular techniques include cryptojacking, in which miners take over vulnerable computer systems and harness their computing power to mine cryptocurrency; malicious cryptocurrency mining software, in which miners distribute malicious software and programs to exploit vulnerabilities in computer systems; malicious crypto miners, in which miners use social engineering techniques to gather personal and financial data; and cryptocurrency mining malware, in which miners spread malware to steal resources from computer systems.
The researchers reported that malicious cryptocurrency mining operations are often well-organized, professional, and highly profitable. They found that malicious miners often deploy multiple techniques to increase their chances of success, such as using cryptocurrency mining botnets to spread malicious software and hijacking or exploiting vulnerable computer systems. Additionally, they discovered that malicious miners often use cryptocurrency mining hardware and malicious cryptocurrency mining activity to maximize their profits.
Finally, the researchers uncovered a number of malicious cryptocurrency miners which have been discovered, uncovered, and removed over the past two years, including Coinhive, K installations, and Crypto-Loot. Based on their analysis, the researchers concluded that malicious cryptocurrency miners pose a “significant threat” to computer systems and recommended continuing vigilance as malicious miners continue to evolve their methods and operations.
This Cyber News was published on thehackernews.com. Publication date: Mon, 23 Jan 2023 18:57:29 +0000