Cryptocurrency Malware Theft Is Worth Millions

The Dark Web is associated with the illegal trade in malware and malicious hacking tools, a market which has now turned towards lucrative cryptocurrency theft.  Cryptocurrency, including Bitcoin (BTC), Ethereum (ETH), and Monero (XMR), has grown popular have boomed over the last few years. 

The market is no longer just a way to trade virtual assets in a decentralised, somewhat anonymous fashion. Instead, startups have emerged which focus solely on cryptocurrency and the blockchain, well-known brands are launching Initial Coin Offerings (ICOs), and the crypto-currency market has become a speculative way for investors to make serious money.

However, with popularity rising, so does the interest from criminals, and this has created a new industry in the world of hacking tools and software.

According to Carbon Black's latest research report, on Cryptocurrency on the Dark Web, the market for malware and tools designed specifically for the theft of crypto-currency is growing apace. The researchers estimate that over the past six months alone, a total of $1.1 billion has been stolen in cryptocurrency-related thefts, and approximately 12,000 marketplaces in the underbelly of the Internet are fueling this trend.

In total, there are roughly 34,000 products and services on sale that are related to cryptocurrency theft, ranging from just over a dollar in price to $224, with an average cost of around $10.

"The available dark web marketplaces represent a $6.7 million illicit economy built from crypto-currency-related malware development and sales," the researchers say.

Cryptocurrency-stealing malware, such as crypto-jackers GhostMiner and Loapi, appear to be the tools of choice for cybercriminals seeking to cash in on the craze for virtual coins.

Carbon Black claims that cryptocurrency exchanges are the most vulnerable targets for cyber-criminals, with close to a third, 27 percent, of attacks directed at these trading posts. In total, close to 21 percent of attacks target businesses directly, while seven percent are aimed at governments.

In February 2018,a cryptojacking scheme compromised the UK and Australian government websites, siphoning visitor PC power in order to mine for Monero. In total, roughly 4,000 domains were affected, and a legitimate third-party plugin installed to assist visitors with visual impairments was at fault after being compromised at the source.

The bulk of cryptocurrencytheft offerings are based on Bitcoin, likely due to the virtual currency's popularity and the promise of high returns.

However, 44 percent of attacks now relate to Monero, likely due to crypto-jacking rather than outright wallet compromise. An estimated 11 percent of attacks involve Ethereum. Traders do not want to be paid in Bitcoin themselves due to high transaction fees associated with the crypto-currency and the length of time it can take to process a payment. Instead, Monero is the crypto-currency of choice due to comparably low fees, privacy, and non-traceability.

"Our analysis of the marketplace suggests cryptocurrency-related malware listings are designed to cater to unskilled cyber actors, or those looking to make a quick buck from highly vulnerable victims," Carbon Black says. 

"The listings are riddled with phrases that emphasise the sheer simplicity in using these tools. The phrases are not something we typically expect to see in offerings geared toward sophisticated actors."

ZDNet

You Might Also Read:

Criminal Web-Injects Can Steal Cryptocurrency:

Crypto-Mining Is A Growing Epidemic:
 

 

« Profile Of An Ethical Bug Hunter
How Computer Data Helped Investigate Quebec Shooter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

e-Safer

e-Safer

e-Safer's mission is to provide solutions and services that ensure a safer digital environment.