CoinHive cryptogeld Miner Is 6e meest voorkomende malware, zegt Report

Cyber-security solutions provider Check Point Software has said that the threat from cryptocurrency mining malware is rapidly growing.

According to the company’s latest Global Threat Impact Index report, the CoinHive variant became the sixth most-used malware in October. CoinHive – a JavaScript program that lurks unseen on websites – works by tapping the processing power of visitorscomputers to mine monero.

Maya Horowitz, threat intelligence group manager at Check Point, said in a press release that the emergence of mining malware like CoinHive highlights theneed for advanced threat prevention technologiesto curb such practices and protect networks from cyber-criminals.

Horowitz added:

Crypto mining is a new, silent, yet significant actor in the threat landscape, allowing threat actors to make significant revenues while victimsendpoints and networks suffer from latency and decreased performance.

Volgens het rapport, malware variant RoughTed (adware) topped the index, followed by Locky (ransomware) and Seamless (traffic redirection).

Kort geleden, internet domain provider Cloudflare suspended websites that ran hidden cryptocurrency miners, including that of the operator of torrent site ProxyBunker. This site was said to be running the Coinhive miner for four days prior to the suspension.

Malware image via Shutterstock

De leider in blockchain nieuws, CoinDesk is een onafhankelijke media stopcontact dat streeft naar de hoogste journalistieke normen en houdt zich aan een strikte set van redactionele richtlijnen. Heeft u het laatste nieuws of een verhaal tip te sturen naar onze journalisten? Neem contact met ons op [email protected]

Laten we advertenties blokkeren! (Waarom?)

Bron: Coindesk