GlobeNewswire by notified

Cryptomining Replaces Ransomware as Most Popular Cybercrime Malware

Share

Analysis of vulnerability and threat trends shows cryptomining malware dominates threat landscape in the first half of 2018

SAN JOSE, Calif., July 18, 2018 (GLOBE NEWSWIRE) -- Skybox® Security, a global leader in cybersecurity management, announced today the release of its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape.

The mid-year update explores trends observed from January to June of 2018. One of the most significant findings is the replacement of ransomware as the cybercriminal tool of choice with cryptomining malware. In the last six months of 2017, ransomware accounted for 32 percent of attacks, while malicious cryptominers accounted for seven percent. By the first half of 2018, the figures had switched almost exactly: malicious cryptominers accounted for 32 percent of attacks while ransomware dropped to eight percent.

"In the last few years, ransomware reigned supreme as the shortcut money-maker for cybercriminals," said Ron Davidson, Skybox CTO and vice president of R&D. "It doesn't require data exfiltration, just encryption to hold the data hostage and a ransom note of how the victim can pay up. With cryptominers, the criminals can go straight to the source and mine cryptocurrency themselves. There's no question of if they'll be paid or not."

Cryptomining uses the computational power of compromised assets to create new blocks in the blockchain of like Bitcoin and Monero. The malicious or unauthorized cryptomining approach indeed avoids several of the drawbacks of ransomware:

  • The victim doesn't need to be notified of the attack in order to pay the ransom, so it can continue indefinitely in a stealth manner
  • Cryptocurrency can be mined over long-periods of time, rather than the cybercriminal receiving a single lump-sum ransom payment
  • There is no decision of payment on the part of the victim - the attack itself controls how much money will be generated.

"Ransomware received a lot of attention in years past, especially thanks to the likes of WannaCry, NotPetya and BadRabbit," said Skybox Director of Threat Intelligence Marina Kidron and leader of the Research Lab behind the report. "To some extent, organizations took note and put effective precautions in place, ensuring they had reliable back-ups and even thwarting attackers with decryption programs. So cybercriminals found - in cryptomining- a path of lesser resistance. The recent uptick in value of cryptocurrencies also made this an incredibly profitable attack option."

Other findings in the report appear to relate to this rise in cryptomining. Internet and mobile vulnerabilities made up nearly a third of all new vulnerabilities published in the first half of 2018. Google Android had by far the most vulnerabilities during that time period, exceeding the tally of the next five most vulnerable vendors combined. Android also logged 200 more vulnerabilities than it did in the second half of 2018. Malicious cryptomining has found an advantage in targeting the app store of the global market leader in mobile devices, with billions of potential targets worldwide.

Browser-based malware is also on the rise in the first half of 2018. "Out of all software today, web browsers are considered the most prone to malicious attacks," said Kidron. "They constantly interact with websites and applications that cybercriminals have infected with malware like cryptominers and other threats via the web, which are notoriously difficult to detect. The cryptomining malware could be active as long as the web session is active, and 'file-less' cryptominers also can hide from conventional security tools as there's no download or attachment to analyze."

No matter the payload, attackers looking to exploit vulnerabilities have more resources than ever. Not only are dark web market places rich with attack tools and services, and criminal forums ripe with information, vulnerabilities themselves have skyrocketed. New vulnerabilities catalogued by MITRE's National Vulnerability Database doubled in 2017 over the previous year, and 2018 looks to be on track to shatter even that record. The 2017 surge and continued elevated numbers is largely due to organizational improvements at MITRE and increased security research by vendors and third-parties, including vendor-sponsored bug bounty programs. But no matter the reason, organizations have to employ smarter and faster ways to find the signal in the noise and mitigate vulnerability risks before they're used in an attack.

Skybox recommends establishing a threat-centric vulnerability management (TCVM) program to adapt to these changes in the threat landscape and those yet to come. The TCVM approach helps security practitioners focus on the small subset of vulnerabilities most likely to be used in an attack by incorporating vulnerability and threat intelligence with the context of their assets, network and security controls. This way, remediation is targeted at the greatest areas of risk while leveraging all response options - patching as well as network-based changes.

To read the full report on vulnerability and threat trends thus far in 2018, click here. To learn more about Skybox vulnerability management approach, download our e-book here

About Skybox Research Lab 
The Skybox Research Lab is team of security analysts who daily scour data from dozens of security feeds and sources as well as investigate sites in the dark web. The Research Lab validates and enhances data through automated as well as manual analysis, with analysts adding their knowledge of attack trends, cyber events and TTPs of today's attackers. Their ongoing investigations determine which vulnerabilities are being exploited in the wild and used in distributed crimeware such as ransomware, malware, exploit kits and other attacks exploiting client- and server-side vulnerabilities.

For more information on the methodology behind the Skybox Research Lab and to keep up with the latest vulnerability and threat intelligence, visit www.vulnerabilitycenter.com.

About Skybox Security

Skybox provides the industry's broadest cybersecurity management platform to address security challenges within large, complex networks. By integrating with 120 networking and security technologies, the Skybox® Security Suite gives comprehensive attack surface visibility and the context needed for informed action. Our analytics, automation and intelligence improve the efficiency and performance of security operations in vulnerability and threat management and firewall and security policy management for the world's largest organizations.

© 2018 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

CONTACT INFORMATION

Skybox Security
Tawnya Lancaster
Director of Brand and Communications
408-205-1618 | Tawnya.lancaster@skyboxsecurity.com

OneChocolate for Skybox Security
United Kingdom: Daniel Couzens
+44 (0)20 7437 0227 | DanielC@onechocolatecomms.co.uk

Germany: Melanie Grasser
+49 (0)89 3888 920 10 | MelanieG@onechocolatecomms.de

France: Xavier Delhôme
+33 1 41 31 75 09 | xavier@onechocolate.fr

A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/8c26e3be-8dd4-457a-b19b-becd7c28c469




This announcement is distributed by Nasdaq Corporate Solutions on behalf of Nasdaq Corporate Solutions clients.
The issuer of this announcement warrants that they are solely responsible for the content, accuracy and originality of the information contained therein.
Source: Skybox Security via Globenewswire

About GlobeNewswire by notified

GlobeNewswire by notified
GlobeNewswire by notified
One Liberty Plaza - 165 Broadway
NY 10006 New York

https://notified.com

GlobeNewswire by notified is one of the world's largest newswire distribution networks, specializing in the delivery of corporate press releases financial disclosures and multimedia content to the media, investment community, individual investors and the general public.

Subscribe to releases from GlobeNewswire by notified

Subscribe to all the latest releases from GlobeNewswire by notified by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from GlobeNewswire by notified

Aktietilbagekøbsprogram26.4.2024 10:18:43 CEST | pressemeddelelse

Nørresundby, 26. april 2024 Meddelelse nr. 23/2024 Bestyrelsen i RTX har, jf. selskabsmeddelelse nr. 20/2023 af 30. november 2023, besluttet at iværksætte et aktietilbagekøbsprogram i overensstemmelse med bestemmelserne i artikel 5 i Europa-Parlamentets og Rådets forordning (EU) nr. 596/2014 af 16. april 2014 (MAR) og Kommissionens delegerede forordning (EU) 2016/1052, også kaldet "Safe Harbor"-forordningen. Under programmet vil RTX tilbagekøbe aktier for et beløb på op til DKK 20 mio. i perioden fra 1. december 2023 til 30. september 2024. Følgende transaktioner er foretaget under programmet i perioden nedenfor: Antal aktierGennemsnitlig købsprisTransaktionsværdi i DKKRTX-aktier før programmets start258.52800Akkumuleret andel i programmet, seneste udmelding 154.620 13.070.910 19. april 202480094,9075.92022. april 202480095,7076.56023. april 202480095,0076.00024. april 202480995,1877.00125. april 20249009686.319Akkumuleret under programmet 158.729 84,82 13.462.709 RTX i alt aktier8.467

Share repurchase programme26.4.2024 10:18:43 CEST | Press release

Nørresundby, 26 April 2024 Announcement no. 23/2024 The Board of Directors of RTX has, cf. company announcement no. 20/2023 dated 30 November 2023, resolved to initiate a share buy-back programme in accordance with the provisions of Article 5 Regulation (EU) No. 596/2014 of the European Parliament and of the Council of 16 April 2014 (MAR) and the Commission’s delegated Regulation (EU) 2016/1052, also referred to as the "Safe Harbor" regulation. Under the programme RTX will buy back shares for an amount up to DKK 20 million in the period from 1 December 2023 to 30 September 2024. The following transactions have been made under the programme in the period below: Number of SharesAverage Purchase PriceTransaction value in DKKRTX shares prior to initiation of the programme258,528Accumulated share in the programme, latest announcement 154,620 13,070,910 19 April 202480094.9075,92022 April 202480095.7076,56023 April 202480095.0076,00024 April 202480995.1877,00125 April 202490095.9186,319Accum

Composition of the Nomination Committee of Orion Corporation26.4.2024 10:15:00 CEST | Press release

ORION CORPORATION STOCK EXCHANGE RELEASE – OTHER INFORMATION DISCLOSED ACCORDING TO THE RULES OF THE EXCHANGE 26 APRIL 2024 at 11.15 EEST Composition of the Nomination Committee of Orion Corporation The Board of Directors of Orion Corporation has appointed the following persons to the Nomination Committee of the company: Annika EkmanPetteri KarttunenMinna MaasiltaVeli-Matti MattilaHilpi RautelinSeppo Salonen Hilpi Rautelin was appointed as Chair of the Committee. The Committee prepares and presents a recommendation to the Board of Directors for the proposal to the Annual General Meeting concerning the composition of the Board. The essentials of the charter of the Nomination Committee and a description of the appointment process of its members are provided at https://www.orion.fi/en/investors/corporate-governance/board-of-directors/nomination-committee/charter-of-the-nomination-committee/ , a page in the Corporate Governance section of the Orion Group website. Orion Corporation Liisa Hu

HiddenA line styled icon from Orion Icon Library.Eye