{"id":12962,"date":"2019-03-12T08:46:52","date_gmt":"2019-03-12T12:46:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cryptojacking-rsa2019\/12962\/"},"modified":"2019-11-15T15:22:25","modified_gmt":"2019-11-15T11:22:25","slug":"cryptojacking-rsa2019","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cryptojacking-rsa2019\/12962\/","title":{"rendered":"Rise of the cryptojackers"},"content":{"rendered":"<p>Cryptojacking is the unauthorized use of someone else\u2019s computer to mine cryptocurrency. Put simply, it is malicious mining. Cybercriminals use various surreptitious means to install miner programs on other people\u2019s computers (preferably in bulk), and take all of the profit from cryptocurrency mining without incurring any of the equipment or electricity costs.<\/p>\n<p>If you are not familiar with <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cryptojacking\/\" rel=\"noopener noreferrer\">cryptojacking<\/a>, now is the perfect time to read up on it. Here\u2019s why.<\/p>\n<h2>Explosive growth in cryptojacking<\/h2>\n<p>Logically, you might think that the fall in cryptocurrency values should have led to a decline in cryptojacking, because there is less profit to be had from it. But quite the opposite happened. At RSA Conference 2019, Cisco Umbrella analysts reported that the volume of cryptomining-related corporate traffic worldwide had increased about 200-fold during the year! This is a direct result of the rise of cryptojacking.<\/p>\n<p>Most likely, it is because during the boom years people grew used to high yields from cryptomining. But after the market sank, and using one\u2019s own equipment and electricity for mining became unprofitable, some decided to switch to a less-honest alternative \u2014 cryptojacking.<\/p>\n<h2>Who suffers the most from cryptojacking?<\/h2>\n<p>The main damage from cryptojacking is felt by small and medium-size businesses \u2014 the former account for about one-third of cryptomining traffic, the latter one-half. Enterprises\u2019 share of the pain is just 18%, presumably because big business is more serious-minded about information security, whereas SMBs have a more relaxed attitude.<\/p>\n<p>The distribution of cryptomining traffic by industry is interesting: In first place is the energy sector (34%), followed by education (26%) and healthcare (7%).<\/p>\n<p>Cisco Umbrella statistics indicate that cryptojackers\u2019 main target was North America: The US accounted for 62% of cryptomining traffic, with another 2% from Canada. EMEA is in second position with a more modest 6%. The biggest surprise was South Africa with around 2% of mining-related traffic, enough for third place.<\/p>\n<h2>How to protect against cryptojacking<\/h2>\n<p>Never underestimate the damage that cryptojacking can cause. Sure, malicious mining is far less destructive than ransomware. But the losses are direct \u2014 victims have to pay for computing power and electricity, which can translate into considerable sums.<\/p>\n<p>What\u2019s more, the very fact that some kind of illegal activity is being carried out on your company\u2019s computers is not good news. It means your IT infrastructure has vulnerabilities. Today, they are being exploited for cryptojacking, but when that business becomes less lucrative, they will be put to some other purpose.<\/p>\n<ul>\n<li>Use reliable <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solutions<\/a>, preferably with specially designed anticryptojacking technologies.<\/li>\n<li>Also install <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/embedded-systems?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">protection software<\/a> on embedded devices (public displays, terminals, etc.) and enable Default Deny mode where possible.<\/li>\n<li>Monitor traffic: Frequent queries to domains of popular <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/17768\/\" rel=\"noopener noreferrer nofollow\">cryptomining pools<\/a> are a clear sign that someone is mining at your expense. Ideally, add these domains to your domain block lists for all computers in your network \u2014 lists of such domains can be found online. New domains are constantly appearing, so be sure to update the list systematically.<\/li>\n<li>Immediately investigate any abnormal increase in processor usage needs for cloud computing platforms such as Amazon EC2, Microsoft Azure, and others.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.<\/p>\n","protected":false},"author":40,"featured_media":12963,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,5,1917],"tags":[1729,1819,1429,1591,977,2059,1289],"class_list":{"0":"post-12962","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-news","9":"category-smb","10":"tag-cryptojacking","11":"tag-cryptomining","12":"tag-miners","13":"tag-mining","14":"tag-rsa-conference","15":"tag-rsa2019","16":"tag-rsac"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptojacking-rsa2019\/12962\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptojacking-rsa2019\/15392\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptojacking-rsa2019\/17335\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptojacking-rsa2019\/15489\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cryptojacking-rsa2019\/14182\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cryptojacking-rsa2019\/18013\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cryptojacking-rsa2019\/17026\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptojacking-rsa2019\/22390\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cryptojacking-rsa2019\/5763\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptojacking-rsa2019\/25938\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cryptojacking-rsa2019\/11514\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cryptojacking-rsa2019\/11577\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cryptojacking-rsa2019\/10467\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptojacking-rsa2019\/18733\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptojacking-rsa2019\/22765\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptojacking-rsa2019\/18079\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptojacking-rsa2019\/22267\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptojacking-rsa2019\/22203\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cryptojacking\/","name":"cryptojacking"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12962"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12962\/revisions"}],"predecessor-version":[{"id":14491,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12962\/revisions\/14491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12963"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}