Manila Bulletin

Defeating Cryptojack­ing

- David Maciejak

According to David Maciejak, cryptojack­ing is a new step in the evolution of malware monetisati­on methods.

One of the first successful monetisati­on formulas was banking malware, where banking credential­s were communicat­ed back to cyber criminals. Cryptojack­ing has one main advantage over these two monetisati­on methods − if well designed, the mining process can run in the background without drawing attention to itself. In the best case, the user will be unaware that there is any extra processing going on. This makes it almost a “victimless crime” in the sense that the user may not be aware that there is a problem, as opposed to having a computer visibly disabled, losing precious documents, or having money stolen from bank accounts.

The downside for cybercrimi­nals hoping to profit from cryptojack­ing is that many victims are needed to gain enough resources to make significan­t profits. Ultimately, that will be the factor that decides whether cryptojack­ing will continue as an attack vector..

Organisati­ons need to conduct detailed reviews covering the assets that may be at risk, the protection mechanisms in place, and the potential damage to the company should those assets be stolen or destroyed. Assets may be informatio­nbased (files, credential­s or databases) or, as more devices such as video cameras and physical security access systems become connected to the corporate network, physical property.

The damage to firms in the event of an attack may be difficult to assess. Monetary losses from paying off ransomware attacks are easy to determine, but things like document loss, related recovery costs, reputation­al damageand legal liabilitie­s caused by loss of customer data are harder to quantify.

Cryptojack­ing losses are likewise tough to put a finger on. Servers which are mining in the background will have reduced resources for dealing with real work, affecting business productivi­ty. Customer experience on public-facing servers can also be degraded.

These losses, whilst difficult to value, can be substantia­l and it becomes more important than ever to put in place a complete security solution covering all parts of an organisati­on’s network, from the access to the cloud. This solution should not only protect against attacks, but also continuall­y monitor the security “health” of the network to identify potential weak points, and pinpoint and deal with breachesbe­fore real damage is done.

 ??  ??

Newspapers in English

Newspapers from Philippines