Knowing how important and potentially devastating cybersecurity incidents and trends can be, we don’t make predictions lightly, or relish being right about them. Nevertheless, it’s safe to say our prediction has come to pass: 2018 has seen cryptominers take the place of ransomware as top (bad) dog.
Cryptominers fulfill our prophecy
Ransomware is dramatic and can be frightening for victims — from average home users manipulated by tales of illicit and embarrassing files on their computers to businesses strong-armed into paying larger sums to regain access to critical files. Ransomware, however, is in serious decline.
Our data shows that the number of users attacked by cryptomalware dropped by nearly half, from 1,152,299 in 2016–2017 to 751,606 in 2017–2018.
Meanwhile, crafty cryptominers have moved up to take ransomware’s place, invading users’ and businesses’ computers and devices and taking advantage of their power to put cryptocurrency in the pockets of thieves. Over the same two-year period, cryptominer encounters rose in total number, from 1.9 million to 2.7 million, as well as in share of threats detected, from 3% to 4%.
Cryptominers: Signs and symptoms
Whereas ransomware enters with a flourish and freaks out its victims, cryptominers strive to remain hidden — the longer they toil, the greater the perpetrators’ profit — and as a result, victims may not notice them for a time.
If you decide to try mining for yourself, you must anticipate the impact mining has. Someone else secretly using your electronic resources plays things a bit closer to the vest, but they can’t act in complete secrecy. A PC or mobile device secretly mining for currency may show subtle or obvious changes:
- System response will slow; the device’s memory, processor, and graphics adapter are bogged down completing cryptomining tasks.
- Batteries will run down much faster than before, and devices may run quite hot.
- If the device uses a data plan, users will see data usage skyrocket.
Staying safe or recovering
If your suspicion has been raised by the abovementioned symptoms, take the following steps to ensure your system or device is clean — and stays that way.
- Update your operating system and all software regularly. We suggest starting right now.
- Distrust e-mail attachments by default. Before clicking to open an attachment or follow a link, consider carefully: Is it from someone you know and trust; is it expected; is it clean? Hover over links and attachments to see what they’re named or where they really go.
- Don’t install software from unknown sources. It may and often does contain malicious cryptominers.
- Use a strong security solution on all computers and mobile devices, such as Kaspersky Internet Security for Android or Kaspersky Total Security.
- Help educate your team about safe e-behavior, whether that’s family members at home or coworkers in the office.
- You can read the full report on Securelist. Click here to learn about how Kaspersky Lab products protect against miners.