{"id":20364,"date":"2022-11-15T11:54:55","date_gmt":"2022-11-15T16:54:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/malicious-cryptominers-2022\/20364\/"},"modified":"2022-11-16T15:24:06","modified_gmt":"2022-11-16T11:24:06","slug":"malicious-cryptominers-2022","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/malicious-cryptominers-2022\/20364\/","title":{"rendered":"Prices down, miners up"},"content":{"rendered":"<p>We\u2019ve talked a lot lately about <a href=\"https:\/\/www.kaspersky.com\/blog\/crypto-actually-blockchains-and-cryptocurrencies\/45181\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptocurrencies<\/a>, as well as various <a href=\"https:\/\/www.kaspersky.com\/blog\/nvidia-giveaway-bitcoin-scam\/44844\/\" target=\"_blank\" rel=\"noopener nofollow\">scams<\/a> and other <a href=\"https:\/\/www.kaspersky.com\/blog\/top-5-cryptocurrency-heists\/45945\/\" target=\"_blank\" rel=\"noopener nofollow\">crypto-targeting malicious activity<\/a>. Our researchers recently checked out the situation with <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/miner\/\" target=\"_blank\" rel=\"noopener\">malicious miners<\/a> \u2014 programs that secretly generate cryptocurrency for their owners using the resources of others folks\u2019 computers. Although malicious miners don\u2019t directly steal data or money, they can make the victim\u2019s life a misery. A device with a miner slows down, heats up, and becomes unusable long before it would normally. What\u2019s more, a miner consumes lots of electricity \u2014 which the affected user of course has to pay for.<\/p>\n<p>This post lays out our experts\u2019 main findings, and gives tips on how to protect your devices from miners. See our <a href=\"https:\/\/securelist.com\/cryptojacking-report-2022\/107898\" target=\"_blank\" rel=\"nofollow noopener\">Securelist blog<\/a> for a more detailed report.<\/p>\n<h2>Malicious mining on the rise<\/h2>\n<p>Having skyrocketed last year, cryptocurrency prices this year have collapsed just as dramatically. One would expect a corresponding drop in malicious mining, but in fact the exact opposite has occurred: in the first three quarters of 2022, compared to the same period in 2021, the number of new miner modifications increased, as did the number of affected users. Cybercriminals were especially active in the third quarter, during which our solutions detected more than 150,000 new variants of malicious miners. For comparison, in the same period in 2021, fewer than 50,000 appeared.<\/p>\n<p>Our researchers also studied what kinds of malware attackers tried to plant on victims\u2019 devices after exploiting known software <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/vulnerability\/\" target=\"_blank\" rel=\"noopener\">vulnerabilities<\/a>. In the first three quarters of 2022, about one in seven cases turned out to be a malicious miner. And throughout the year, as cryptocurrency prices steadily fell, the share of miners among infections showed stable growth. In the third quarter of 2022, this figure already stood at 17 percent (that is, every sixth case), making cryptocurrency miners the second most common malware after ransomware.<\/p>\n<h2>Pirated software \u2014 with miner included<\/h2>\n<p>Malicious miners, like other malware, spread in a variety of ways. In addition to vulnerabilities, cybercriminals often use pirated content (free movies\/music, hacked software, cracks, cheats, etc.) to deliver such malware. So if, after torrenting a hacked game, your computer suddenly begins to slow down terribly, you may have picked up a miner along the way. And it might not be alone. Not so long ago, for example, our researchers discovered a <a href=\"https:\/\/www.kaspersky.com\/blog\/redline-stealer-self-propagates-on-youtube\/45528\/\" target=\"_blank\" rel=\"noopener nofollow\">malicious combo<\/a>: a miner distributed along with a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/psw-trojans-password-stealing-trojans\/\" target=\"_blank\" rel=\"noopener\">stealer<\/a> (a program that appropriates credentials) under the guise of game cheats and cracks.<\/p>\n<h2>What attackers mine<\/h2>\n<p>The world is already overflowing with cryptocurrencies. Estimates as to their number vary: Cointelegraph, for instance, claims that there are almost 21,000 of them. Besides Bitcoin and Ethereum, which probably everyone has heard of today, there are cryptocurrencies dedicated to public figures and memes (such as Dogecoin), cryptocurrencies of large companies (such as Binance Coin), government cryptocurrencies (such as the Venezuelan Petro), metaverse cryptocurrencies\u2026 and so the list goes on.<\/p>\n<p>By studying samples of malicious miners discovered in September 2022, our researchers established what cryptojackers like to mine most of all. Monero (a cryptocurrency focused on anonymity of transactions, making it very difficult, if not impossible, to track them) proved to be the most popular. Bitcoin places second, and Ethereum third. In addition, some of the analyzed samples generated:<\/p>\n<ul>\n<li>The above-mentioned meme coin Dogecoin;<\/li>\n<li>Litecoin, a \u201clightweight\u201d Bitcoin for cheaper and faster confirmed transactions;<\/li>\n<li>Dash, another Bitcoin spin-off;<\/li>\n<li>Neo, a Chinese cryptocurrency;<\/li>\n<li>Bit Hotel, the currency of the eponymous gaming metaverse.<\/li>\n<\/ul>\n<h2>How not to fall victim<\/h2>\n<p>To avoid unwittingly sharing your computing resources with strangers, be security-conscious:<\/p>\n<ul>\n<li>Download programs, music, and movies only from official sources. Pirated content may come with a hidden miner, or worse.<\/li>\n<li>Remember to promptly update all programs, and never postpone any OS updates. Vulnerabilities in outdated software are often exploited by cybercriminals.<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that detects and blocks miners and other malicious programs.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>In 2022, cryptocurrency prices fell sharply, but malicious miners are more active than ever.<\/p>\n","protected":false},"author":2477,"featured_media":20365,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486,9],"tags":[374,1505,1729,1504,1429,1591,1664,268],"class_list":{"0":"post-20364","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-bitcoin","10":"tag-cryptocurrencies","11":"tag-cryptojacking","12":"tag-ethereum","13":"tag-miners","14":"tag-mining","15":"tag-monero","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/malicious-cryptominers-2022\/20364\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/malicious-cryptominers-2022\/24864\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/malicious-cryptominers-2022\/27405\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/malicious-cryptominers-2022\/25203\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/malicious-cryptominers-2022\/25534\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/malicious-cryptominers-2022\/28081\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/malicious-cryptominers-2022\/27375\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/malicious-cryptominers-2022\/34231\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/malicious-cryptominers-2022\/46186\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/malicious-cryptominers-2022\/19768\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/malicious-cryptominers-2022\/20355\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/malicious-cryptominers-2022\/29515\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/malicious-cryptominers-2022\/32896\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/malicious-cryptominers-2022\/28647\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/malicious-cryptominers-2022\/25593\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/malicious-cryptominers-2022\/31250\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/malicious-cryptominers-2022\/30956\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/miners\/","name":"miners"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2477"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20364"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20364\/revisions"}],"predecessor-version":[{"id":20367,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20364\/revisions\/20367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20365"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}