Unmasking The Silent Threat Of Cryptojacking 

It felt like there was no end in sight for businesses when it came to ransomware attacks. The number of attacks has been soaring year on year since 2020 and every day a major company would be attacked. This led to the positive benefit of global education on cybersecurity and best practices, contributing to ransomware falling a staggering 41% in the last year, according to the latest threat update from SonicWall.

While hackers are pivoting away from ransomware, that doesn't mean the danger is over, as new malware has risen up to take the top spot; cryptojacking.

What Is Cryptojacking?

Cryptojacking is the process of criminals infecting unsuspecting devices, turning them into ‘zombies’, using their processing power to mine for cryptocurrency, with the user never the wiser.

According to the latest, most authoritative data, cryptojacking volume in the first half of 2023 reached 332.3 million, an increase of 399% year-to-date. It has specifically affected Europe, which saw a 788% rise in cryptojacking incidents, signalling that something needs to be done to better protect European businesses. The dangers this poses are twofold.

  • Firstly, businesses that are victim to cryptojacking will unknowingly have their resources syphoned off, leading to slower processing power, as well as potentially increased energy bills.
  • The more prominent risk, however,  is that the malware can then move across all devices on the network (servers, cloud infrastructures and software supply chains) showing how much effect it can have from just one access point.

Once a range of systems are at risk, the biggest issue is the longevity in that it will remain the system while continuing to be a drain on resources. 

Cryptojacking is so often deployed due to its silent but deadly nature. All this happens while the user sits unaware of the uses their device is put to, the only indicator they may have that they have fallen victim to cryptojacking is by noticing a slight slowdown on their device.

Unlike ransomware, a public-facing attack that gets businesses’ attention, cryptojackers want to remain in the system as long and quietly as possible. 

This massive cryptojacking jump could come as a surprise to many as the declining bitcoin price could have prompted cybercriminals to turn their activities elsewhere. However, they’ve put greater efforts behind this form of malware, with a near quadruple increase in attacks, just to collect the same sum of cryptocurrency. The untraceable nature of crypto means that it is potentially being used to fund illicit activities for nation states, or worse…

Kids Are The Future, But Also The Target

One industry most affected by this rise in cryptojacking is the education sector which in the first half of 2023 is reported to have skyrocketed to 320 times the number of attacks recorded in the first half of 2022. This is a major issue for schools that have already been flooded with an array of cyber issues this year, with experts warning that the UK education sector in particular is at risk of increased attacks.

For cybercriminals, schools are a goldmine because they are powerhouses of data with large systems needed to hold it. Not only that, but educational institutions tend to have weaker cybersecurity measures due to low, limited budgets and this vulnerability provides a clear path for cybercriminals to launch cryptojacking operations with relative ease on school systems.

Educational institutions, since the pandemic, now rely heavily on the seamless functioning of their computer systems. These systems facilitate everything from administrative tasks to the delivery of online coursework. Therefore, with cryptojackers targeting schools and universities, they contribute to increasing bills while slowing down their systems. When in the system, who’s to say the attackers aren’t stealing personal data of students to sell on the dark web?.. The education sector is a vital institution which sits at the very centre of our society so students, teachers and parents alike need to be able to trust that their sensitive information is being kept safe by protected school systems. 

Shoring Up A Widening Attack Surface

So what can be done to protect businesses and schools alike? Much like the rest of cybersecurity, solving the issue of cryptojacking requires a nuanced, multi-layer approach, from the top to the bottom.

  • Firstly, it is on businesses, particularly those in oft-hit sectors such as the education sphere, to prioritise cybersecurity from a budgetary and mindset perspective. The cost of a breach is too high to penny-pinch. 
  • Secondly, from a technological perspective, those with outdated or poor-performing security tools must add prevention measures such as Intrusion Prevention Services, which will stop cryptojacking malware from entering networks, and firewalls for network security keeping threats out. They must adopt a zero-trust framework that continuously authenticates and validates all users and devices before granting access to the system.

However, even the best security in the world is likely to face vulnerability, which is why ensuring all software is patched, in the event of a zero-day, is crucial.

One of the most important methods to protect the business from security breaches is to focus on internal education. The strongest security system in the world can still be accessed if employees are not aware of the tricks that bad actors pull to gain access. A refresher course on best password hygiene, multi-factor authentication, and awareness of phishing attacks, is required. The impact of empowering users with strong password policies and robust security measures should not be overlooked for network security, especially as cloud-based tools are becoming more prevalent, making access easier for threat actors.

This cryptojacking surge is a stark reminder that we cannot just focus on the standard forms of cyberattacks and that there are now more nuanced attacks than ever being used by innovative hackers.

There is no time for complacency, Europe is still a hotbed for cybercriminal activity and we only expect attacks to increase. It is therefore up to both the business and individual to prepare themselves, and identify what is missing from their cybersecurity plan.

Spencer Starkey is VP of EMEA at SonicWall                                         Image: Nathan Dumlao

You Might Also Read: 

Take Practical Measures To Avoid An Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Zero-Trust: Protecting From Insider Threats
Is Your Business Ready To Embrace Artificial Intelligence?  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

e-Safer

e-Safer

e-Safer's mission is to provide solutions and services that ensure a safer digital environment.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.