Unmasking The Silent Threat Of Cryptojacking 

It felt like there was no end in sight for businesses when it came to ransomware attacks. The number of attacks has been soaring year on year since 2020 and every day a major company would be attacked. This led to the positive benefit of global education on cybersecurity and best practices, contributing to ransomware falling a staggering 41% in the last year, according to the latest threat update from SonicWall.

While hackers are pivoting away from ransomware, that doesn't mean the danger is over, as new malware has risen up to take the top spot; cryptojacking.

What Is Cryptojacking?

Cryptojacking is the process of criminals infecting unsuspecting devices, turning them into ‘zombies’, using their processing power to mine for cryptocurrency, with the user never the wiser.

According to the latest, most authoritative data, cryptojacking volume in the first half of 2023 reached 332.3 million, an increase of 399% year-to-date. It has specifically affected Europe, which saw a 788% rise in cryptojacking incidents, signalling that something needs to be done to better protect European businesses. The dangers this poses are twofold.

  • Firstly, businesses that are victim to cryptojacking will unknowingly have their resources syphoned off, leading to slower processing power, as well as potentially increased energy bills.
  • The more prominent risk, however,  is that the malware can then move across all devices on the network (servers, cloud infrastructures and software supply chains) showing how much effect it can have from just one access point.

Once a range of systems are at risk, the biggest issue is the longevity in that it will remain the system while continuing to be a drain on resources. 

Cryptojacking is so often deployed due to its silent but deadly nature. All this happens while the user sits unaware of the uses their device is put to, the only indicator they may have that they have fallen victim to cryptojacking is by noticing a slight slowdown on their device.

Unlike ransomware, a public-facing attack that gets businesses’ attention, cryptojackers want to remain in the system as long and quietly as possible. 

This massive cryptojacking jump could come as a surprise to many as the declining bitcoin price could have prompted cybercriminals to turn their activities elsewhere. However, they’ve put greater efforts behind this form of malware, with a near quadruple increase in attacks, just to collect the same sum of cryptocurrency. The untraceable nature of crypto means that it is potentially being used to fund illicit activities for nation states, or worse…

Kids Are The Future, But Also The Target

One industry most affected by this rise in cryptojacking is the education sector which in the first half of 2023 is reported to have skyrocketed to 320 times the number of attacks recorded in the first half of 2022. This is a major issue for schools that have already been flooded with an array of cyber issues this year, with experts warning that the UK education sector in particular is at risk of increased attacks.

For cybercriminals, schools are a goldmine because they are powerhouses of data with large systems needed to hold it. Not only that, but educational institutions tend to have weaker cybersecurity measures due to low, limited budgets and this vulnerability provides a clear path for cybercriminals to launch cryptojacking operations with relative ease on school systems.

Educational institutions, since the pandemic, now rely heavily on the seamless functioning of their computer systems. These systems facilitate everything from administrative tasks to the delivery of online coursework. Therefore, with cryptojackers targeting schools and universities, they contribute to increasing bills while slowing down their systems. When in the system, who’s to say the attackers aren’t stealing personal data of students to sell on the dark web?.. The education sector is a vital institution which sits at the very centre of our society so students, teachers and parents alike need to be able to trust that their sensitive information is being kept safe by protected school systems. 

Shoring Up A Widening Attack Surface

So what can be done to protect businesses and schools alike? Much like the rest of cybersecurity, solving the issue of cryptojacking requires a nuanced, multi-layer approach, from the top to the bottom.

  • Firstly, it is on businesses, particularly those in oft-hit sectors such as the education sphere, to prioritise cybersecurity from a budgetary and mindset perspective. The cost of a breach is too high to penny-pinch. 
  • Secondly, from a technological perspective, those with outdated or poor-performing security tools must add prevention measures such as Intrusion Prevention Services, which will stop cryptojacking malware from entering networks, and firewalls for network security keeping threats out. They must adopt a zero-trust framework that continuously authenticates and validates all users and devices before granting access to the system.

However, even the best security in the world is likely to face vulnerability, which is why ensuring all software is patched, in the event of a zero-day, is crucial.

One of the most important methods to protect the business from security breaches is to focus on internal education. The strongest security system in the world can still be accessed if employees are not aware of the tricks that bad actors pull to gain access. A refresher course on best password hygiene, multi-factor authentication, and awareness of phishing attacks, is required. The impact of empowering users with strong password policies and robust security measures should not be overlooked for network security, especially as cloud-based tools are becoming more prevalent, making access easier for threat actors.

This cryptojacking surge is a stark reminder that we cannot just focus on the standard forms of cyberattacks and that there are now more nuanced attacks than ever being used by innovative hackers.

There is no time for complacency, Europe is still a hotbed for cybercriminal activity and we only expect attacks to increase. It is therefore up to both the business and individual to prepare themselves, and identify what is missing from their cybersecurity plan.

Spencer Starkey is VP of EMEA at SonicWall                                         Image: Nathan Dumlao

You Might Also Read: 

Take Practical Measures To Avoid An Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Zero-Trust: Protecting From Insider Threats
Is Your Business Ready To Embrace Artificial Intelligence?  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.