Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem

What is cryptojacking

Monitoring these elements of your mobile devices, computers, and tablets regularly can potentially help prevent cryptojacking attacks. Blockchain transactions generate complex mathematical puzzles that must be solved before the transaction can be authenticated and completed. Cryptocurrency miners are the people who solve the encrypted puzzles, validate the transaction and earn cryptocurrency for their efforts. The cryptomining process is the only way to create and encrypt new coins on the blockchain. Last summer Bitdefender discovered a Romanian threat group that was targeting Linux-based machines with SSH credentials to deploy Monero mining malware. This example was on the spear tip of what appears to be a growing trend of Linux system cryptomining attacks.

Cryptojacking via malicious links

Attackers seek to amp up the profitability of cryptojacking by expanding their horizons to servers, network devices, and even IoT devices. Servers, for example, are a particularly juicy target since they usually are usually higher powered than a run-of-the-mill desktop. Often attackers will use the initially compromised system to move their cryptojacking laterally into other network devices. Cryptojacking is a scheme to use people’s devices (computers, smartphones, tablets, or even servers), without their consent or knowledge, to secretly mine cryptocurrency on the victim’s dime.

  • It appears that the attackers had come across this Kubernetes console, and realized that there was a huge security lapse – it hadn’t been password protected.
  • When someone downloaded and launched one of the apps, a Google Tag Manager in the domain services would fetch some cryptojacking JavaScript code.
  • This innovative, global technology is becoming more widely-used and accepted each year.
  • However, organizations must dig into the root causes that led to the container compromise in the first place.
  • Software composition analysis (SCA) tools provide better visibility into what components are being used within software to prevent supply chain attacks that leverage coin mining scripts.
  • It is safer to use holistic security solutions such as MyDefender from IONOS or Malwarebytes, which detect both ‘classic’ malware and mining malware and combat them.

What cryptojacking is and how to prevent it

While individual phones have relatively limited processing power, when attacks occur in large numbers, they provide enough collective strength to justify the cryptojackers’ efforts. In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies. Cryptomining malware is specifically designed to exploit a target’s computer resources, often through a browser or JavaScript.

What is cryptojacking

How to Detect and Prevent Cryptojacking

What is cryptojacking

According to Gartner, effectively defending against threats to your endpoints means deploying a solution that has NGAV and EDR capabilities. Once your computer is infected and an attacker successfully has remote command of your device, you may notice it running slower than usual, or hear the fan running more often than normal. That is because mining is a resource-intensive activity, and can affect your ability to use your computer or phone to its full capabilities.

How do you detect cryptojacking?

Cryptojacking is a cyberattack that hijacks the cryptomining process — the process of verifying cryptocurrency transactions by solving complex puzzles using computing power. Cryptojacking is a form of malicious cryptomining that allows cybercriminals to mine cryptocurrency using another entity’s computing power. Cryptojacking malware often infects devices through standard phishing techniques.

Block pages known to deliver cryptojacking scripts:

Given crypto’s surging popularity, safeguarding assets is critical regardless of individual usage. While some crypto users only keep enough for small payments at a time, others conduct large trades or make substantial investments with considerable value. In an example scenario, attackers might leverage a Denial of Service (DoS) attack, such as a synchronize (SYN) flood, to create a diversion. This tactic floods target servers with excessive requests, creating noise and distraction, making it harder for traditional monitoring tools to detect the more dangerous exploits happening simultaneously. What are some immediate actions to detect this invasive and disruptive activity? Progress Flowmon can help your IT team to better detect and stop cryptojacking infections on your network.

Cybercriminals are looking for websites where they can embed cryptomining code. Regularly monitor your own websites for changes to webpages or any files on the web server. This early detection can prevent your systems from being compromised by cryptojacking. A new trend for hackers is to embed cryptojacking malware on YouTube, where it’s easy to get users to click and activate cryptomining scripts. In cryptomining, miners provide their own computing capacity or combined capacities (when part of pools) in order to legitimise and verify transactions with cryptocurrencies and to document them in the blockchain. To ensure the legality of transactions, Bitcoin transactions, for example, are publicly recorded.

What is cryptojacking

It was also known to use the EternalBlue exploit at times, although this was just one component in its versatile arsenal that helped it grow to infect over half a million Windows systems within a few months. In September 2019, MyKingz was still causing almost five thousand infections each day. The Kobe Bryant wallpaper scheme and the MyKingz botnet had something a little unusual in common – they both used celebrity images to spread their attacks at some stage. Despite this, many of the other elements in the attacks were quite different. This meant that Coinhive would receive 100 percent instead, essentially tripling its profits.

While cryptojacking may seem relatively benign, the major problems with the practice are that it is often done without consent, and that it can cause performance issues for those affected. Bitcoin’s What is cryptojacking success inspired dozens of other cryptocurrencies that operate in more or less the same way. Today, people all over the world use cryptocurrencies to buy things, sell things, and make investments.