Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Every fifth corporate network faced a cryptomining malware attack in 2020

April 2021 by Data acquired by Crypto Parrot

Data acquired by cryptocurrency trading simulator Crypto Parrot indicates that cryptomining malware accounted for the second-largest corporate network attacks at 21% between January 1, 2020, and December 31.

Botnet took the pole position during the same period at 28%. Infostealer ranks third with a share of 16%, followed by mobile at 15%. Banking malware attacks rank fifth with a share of 14%. Ransomware accounted for the least form of attack at 5%.

In terms of regional distribution, cryptominers accounted for 19% of corporate malware attacks in the Americas. Europe, Middle East, and Africa (EMA) region saw cryptomining malware take up 21% of attacks. The Asia-Pacific region accounted for the highest cryptomining malware attacks on corporate networks at 26%. Surging crypto sector value contributes to rising in cryptomining malware

The report overviews some of the contributing factors for cryptominers to occupy a significant share among corporate malware attacks. According to the research report:
"In 2020, digital assets remained resilient amid the economic meltdown occasioned by the coronavirus pandemic. The value of cryptocurrency began rising from the third quarter of 2020, led by bitcoin in return bolstering the amount of money hackers can rake in. In general, attackers took advantage of the price trend and increasingly spread malware to exploit other people’s computer resources for illegal mining activities."

Cryptomining hackers are also advancing their act by focusing on anonymous digital assets, like Monero.

In general, they are going for assets that can hide transaction parties and amounts that cannot be linked to previous transactions and are designed for mining on ordinary computers.




See previous articles

    

See next articles