Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Has Your Company’s Infrastructure Been Hijacked by Bitcoin Miners?

Crypto-mining Malware Exposes Organizations to a Host of Monetary and Reputational Risks

Crypto-mining Malware Exposes Organizations to a Host of Monetary and Reputational Risks

With Bitcoin prices reaching a record high in December, cryptocurrencies have been dominating media headlines. While most choose to invest or trade in cryptocurrencies and bide their time while the prices rise, others find that the real money lies in mining it. And with the current reward at 12.5 bitcoins for mining one block of bitcoin transactions, it is clear why crypto-mining is a lucrative pursuit.

However, due to the enormous amount of required computing power, it’s almost impossible to profitably mine Bitcoin on commodity hardware such as laptops, smartphones, or desktop computers. It takes much too long and, in most cases, the cost of electricity is higher than the anticipated revenue. Profits from crypto-mining are therefore inextricably tied to the cost of electricity, with higher energy costs meaning a cut in profit margins.

Perhaps unsurprisingly, this has led some to take shortcuts in the search for power sources – individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures. In the past 6 months alone, we have detected and intercepted over 1,000 incidents of cryptocurrency mining.

Across these incidents, we’ve seen eager crypto-mining attackers surreptitiously penetrate corporate networks by spear phishing, or sneakily planting malware on websites, allowing the malware to spread laterally through a network. Irrespective of the threat vector, the end-goal is the mobilization of an army of crypto-mining machines – a cyber-threat that is notoriously difficult to catch.

Crypto-mining incidents happen daily. In one incident, an employee at a manufacturing company had unwittingly downloaded malware, which initiated a channel of communication between the employee’s machine and a collection of servers appearing to come from Eastern Europe. The suspect connection was followed by hundreds of anomalous downloads and command & control communication. Upon inspection, it became clear that the external connections were bitcoin mining pools and a foreign cyber-attacker was attempting to leverage the corporate infrastructure for computing power.  

But the threat isn’t always external. In another recent example, a highly acclaimed law firm had a bitcoin mining incident on their network. It transpired that a legal summer intern was illicitly using the law firm’s infrastructure to mine bitcoins; slowing down the network for all of the lawyers working on billable projects.

Although this new breed of cyber-criminal may not be maliciously trying to obtain sensitive customer data or steal corporate secrets, crypto-mining exposes organizations to a host of monetary and reputational risks. A breach could mean astronomical electricity costs, inefficient business processes, and reputational damage. Imagine the infrastructure of a financial institution that is openly against unregulated cryptocurrencies is revealed to have been used for crypto-mining. The hypocrisy would have major reputational ramifications for the organization and would surely result in loss of business. In light of these risks, the opportunity cost of ignoring cryptocurrency mining as a threat to your business is simply too high.

Advertisement. Scroll to continue reading.

But how can we identify the early warning signs of a crypto-mining breach? Perimeter defenses, which are rigidly programmed to detect known ‘bad’ have consistently fallen short at catching this type of threat. Simply, traditional security tools were not designed with cryptocurrency mining attacks in mind.

AI-powered cyber defense offers the best chance to detect and fight back against crypto-mining attacks – this technology can catch not only new anomalous behavior, but can also understand if a threatening presence is already in operation in your network. Capable of learning what is ‘self’ and what is ‘other’ for every user and device, this AI technology can identify and neutralize crypto-related incidents before they have time to cause material or reputational harm.

Detecting subtle deviations from normal ‘patterns of life’ is critical to identifying crypto-mining. Computers running slowly may indicate more than just aging technology: it could be the symptom of crypto-mining programs running on stolen company infrastructure. And while a rogue device connecting to rare destinations would go undetected by a firewall or antivirus, it could be the first sign of a foreign presence infiltrating a network in pursuit of crypto-mining. In both instances, AI would be able to spot the deviations from normal behavior and alert security teams in real time.

As long as the value of cryptocurrencies continues to grow, the incentive for attackers and malicious insiders to monetize powerful corporate infrastructures via crypto-mining will grow. With new cryptocurrencies, known as ‘altcoins’, emerging nearly every day, cryptocurrencies and the threats that accompany them are clearly more than just a phase – they are here to stay. AI technologies that can spot these forms of subtle attack already exist, enabling security teams to stay ahead of profit-hungry insiders and external attackers.

RelatedWhere to Look for Mining Malware and How to Respond

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.