Story image

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list

16 Apr 2018

Check Point’s March 2018 Most Wanted Malware suggests that cryptomining malware is moving away from browser-based mining sessions and targeting the endpoint – or at least the XMRig malware is doing so.

In March this year there were a surge of cryptomining malware attacks – most notably the XMRig malware which landed eighth place on the list last month.

XMRig has been in the wild since May 2017 and landed a top 10 spot after a 70% increase in global impact. It affected 5% of organizations in March.

The malware doesn’t need an active web browser session on a targeted computer; instead it uses the computer itself to mine Monero cryptocurrency.

“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested in modifying and improving their methods in order to stay ahead of the curve,” comments Check Point threat intelligence group manager Maya Horowitz. 

“Besides slowing down PCs and servers, cryptomining malware can spread laterally once inside the network, posing a major security threat to its victims. It is therefore critical that enterprises employ a multi-layered cybersecurity strategy that protects against both established malware families and brand new threats.”

The Coinhive cryptominer took the top spot as the top most wanted malware in March. It mines the Monero cryptocurrency and targeted 18% of organizations. Rig EK placed second, targeting 17% of organizations; and Cryptoloot miner was third, targeting 15% of organizations.

March’s 2018’s Top 3 ‘Most Wanted’ Malware:

1.       Coinhive – Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's knowledge or approval

2.       Rig EK - Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer.

3.       Cryptoloot - Crypto-Miner that uses the victim’s CPU or GPU power and existing resources to add transactions to the blockchain and releasing new currency.

Lokibot, an Android banking Trojan which grants super user privileges to download malware, was the most popular malware used to attack organizations’ mobile estates followed by the Triada and Hiddad.

March’s Top 3 ‘Most Wanted’ mobile malware:

1.    Lokibot - Android banking Trojan and info-stealer, which can also turn into a ransomware that locks the phone.

2.    Triada - Modular Backdoor for Android which grants superuser privileges to downloaded malware.

3.    Hiddad- Android malware which repackages legitimate apps then releases them to a third-party store.

Check Point researchers also analyzed the most exploited cyber vulnerabilities. CVE-2017-10271 came first with a global impact of 26%, in second place was the SQL injection vulnerability impacting 19%, and in third place was CVE-2015-1635 with a global impact of 12% of organizations.

March’s Top 3 ‘Most Wanted’ vulnerabilities:

1.       Oracle WebLogic WLS Security Component Remote Code Execution (CVE-2017-10271)- A remote code execution vulnerability exists within Oracle WebLogic WLS. This is due to the way Oracle WebLogic handles xml decodes. A successful attack could lead to a remote code execution.

2.       SQL Injection- Inserting an injection of SQL query in input from client to application, while exploiting a security vulnerability in an application's software.

3.       Microsoft Windows HTTP.sys Remote Code Execution (MS15-034: CVE-2015-1635)- A remote code execution vulnerability has been reported in Windows OS. The vulnerability is due to an error in the way HTTP.sys handles a malicious HTTP header. Successful exploitation would result in a remote code execution.

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.