Clearly, there has been a considerable rise in crypto mining malware. This is supported by the latest report from McAfee, which stated that crypto mining malware recorded increase of 86% in the second quarter of 2018.
Christiaan Beek, the lead scientist at McAfee, expressed that a few years ago, they wouldn’t consider of video-recording devices, internet routers and other IoT devices as base for crypto mining. These devices speeds were too inadequate to support such productivity.
The situation is quite different in the present world. The remarkable volume of such connected devices and their inclination for weak passwords showcase an extremely interesting platform for this activity.
As the researchers stated, crypto mining malware has surged fast to become a big threat. The new samples listed numbered around 400,000 in Q42017. The figure surged by a gigantic 629% in the subsequent three months to surpass 2.9 million. This figure rose further in Q2 2018, with more than 2.5 million new samples recorded.
McAfee’s report also stated that in some cases crypto mining malware is intended at specific groups instead of an extensive victim base. There was one malware strain that attacked a Russian gaming forum, coming as a “mod” that allegedly improved popular games. This malware exploited the PC resources after it was downloaded by the users on their system. Mobile devices are on increased risk of being targeted by crypto mining malware, especially in Asia.
Hackers do not restrict themselves to personal systems. As recently stated, Indian government websites were the latest sufferers of digital currency mining malware. The municipal management of Andhra Pradesh, Macherla municipality, The Tirupati Municipal Corporation, and some citizen platforms were attacked by crypto jacking malware. So, the threat is real and wide spreading.