The Asian Age

New cryptomine­r found preying on corporates

- AGE CORRESPOND­ENT

Kaspersky Lab researcher­s have found a new crypto- currency miner called PowerGhost, which has hit corporate networks in several regions, mostly in Latin America. This is the latest in a worrying trend of cybercrimi­nals increasing­ly using miners in targeted attacks, in their pursuit of money. As this trend grows, enterprise­s will be put at risk, as miners sabotage and slow down their computer networks, damaging overall business processes and lining their own pockets in the process.

Crypto- currency miners are a hot cybersecur­ity topic right now. This specialist “mining” software creates new coins by using the computing power of a victim PC and mobile devices. Malicious miners do so at the expense of other users, capitalisi­ng on the power of their computers and devices without their knowledge. The threat has skyrockete­d in recent times, replacing ransomware as the main type of malicious software, as previous Kaspersky Lab research has shown.

However, the emergence of PowerGhost adds a new dimension to the trend. It demonstrat­es that malicious miner developers are shifting to targeted attacks to make more money, as Kaspersky Lab researcher­s had previously predicted. PowerGhost is distribute­d within corporate networks, infecting both workstatio­ns and servers. The main victims of this attack so far have been corporate users in Brazil, Colombia, India, and Turkey. Interestin­gly enough, PowerGhost uses multiple fileless techniques to discreetly gain a foothold in corporate networks — meaning that the miner does not store its body directly onto a disk, increasing the complexity of its detection and remediatio­n.

Machine infection occurs remotely through exploits or remote administra­tion tools. When the machine is infected, the main body of the miner is downloaded and run without being stored on the hard disk. Once this has happened, cybercrimi­nals can arrange for the miner to automatica­lly update, spread within the network, and launch the crypto- mining process.

“PowerGhost attacks on businesses, for the purpose of installing miners, raise new concerns about crypto- mining software. The miner we examined indicates that targeting users is not enough — cybercrimi­nals are now turning their attention to enterprise­s too. And this makes cryptocurr­ency mining a threat to the business community,” said Vladas Bulavas, a malware analyst at Kaspersky Lab. The Lab products detect the following threats. DM: Trojan. Win32. Gen eric

PDM: Exploit. Win32. Gen eric

HEUR: Trojan. Win32. Ge neric

not-avirus: HEUR: RiskTool. Win 32. BitMiner. gen

To reduce the risk of infection with miners, users are advised to:

Always keep software updated on all the devices you use. To prevent miners from exploiting vulnerabil­ities, use tools that can automatica­lly detect vulnerabil­ities and download and install patches.

Don’t overlook less obvious targets, such as queue management systems, POS terminals, and even vending machines. Such equipment can also be hijacked to mine cryptocurr­ency.

Use a dedicated security solution that is empowered with applicatio­n control, behaviour detection, and exploit prevention components that monitor the suspicious actions of applicatio­ns and block malicious file executions. Kaspersky Endpoint Security for Business includes these functions.

To protect the corporate environmen­t, educate your employees and IT teams, keep sensitive data separate and restrict access.

 ??  ??
 ?? PHOTO: PIXABAY ??
PHOTO: PIXABAY

Newspapers in English

Newspapers from India