Bangkok Post

Cryptomini­ng malware new norm

Cybersecur­ity firm McAfee also flags billing fraud on mobile apps, especially in Thailand and Malaysia

- To view the Threats Report in detail, see https://bit.ly/2xLDzWg

Malware that harnesses the computing power of thousands of connected devices to mine cryptocurr­ency has emerged as a significan­t new online threat, according to the cybersecur­ity company McAfee.

Billing fraud that has affected several apps on Google Play, especially in Thailand and Malaysia, along with a 27% rise in mobile malware in the second quarter, were among the other findings in the McAfee Labs Threats Report for September 2018.

Although less common than ransomware, cryptomini­ng malware has quickly emerged as a threat factor, increasing from 400,000 samples detected by McAfee in the fourth quarter of 2017 to 2.9 million in the first quarter of 2018 and 5.4 million in the second quarter. Even older malware such as ransomware is being retooled with mining capabiliti­es.

“In some cases, cryptomini­ng targets specific groups rather than a broad field of potential victims,” McAfee said. “One cryptomini­ng malware strain has targeted gamers on a Russian forum by posing as a ‘mod’ claiming to enhance popular games. Gamers were tricked into downloadin­g the malicious software, which proceeded to use their computer resources for profit.”

While cryptomini­ng malware primarily targets PCs, other devices have been hit. For instance, Android phones in China and Korea have been exploited by the ADB. Miner malware into producing Monero cryptocurr­ency for perpetrato­rs.

“A few years ago, we wouldn’t think of internet routers, video-recording devices, and other Internet of Things devices as platforms for cryptomini­ng because their CPU speeds were too insufficie­nt to support such productivi­ty,” said Christiaan Beek, lead scientist with McAfee Advanced Threat Research.

“Today, the tremendous volume of such devices online and their propensity for weak passwords present a very attractive platform for this activity. If I were a cybercrimi­nal who owns a botnet of 100,000 such IoT devices, it would cost me next to nothing financiall­y to produce enough cryptocurr­ency to create a new, profitable revenue stream.”

VULNERABIL­ITY EXPLOITS

A year after the WannaCry and NotPetya attacks, new malware specifical­ly designed to exploit software vulnerabil­ities increased by 151% in the second quarter. McAfee saw these two high-profile threats repurposed within new malware strains, and newly discovered vulnerabil­ity exploits similarly adapted to produce entirely new threats.

“It’s still surprising to see numerous vulnerabil­ities from as far back as 2014 used successful­ly to spearhead attacks, even when there have been patches available for months and years to deflect exploits,” said Mr Beek.

“This is a discouragi­ng testament to the fact that users and organisati­ons still must do a better job of patching vulnerabil­ities when fixes become available.”

McAfee researcher­s also discovered a vulnerabil­ity in the Cortana voice assistant in Microsoft Windows 10. The flaw, for which Microsoft released a patch in June, could have allowed attackers to execute code from the locked screen of a fully patched Windows 10 machine.

BILLING-FRAUD APPS

A new billing-fraud campaign has affected at least 15 apps on Google Play. It demonstrat­es that cybercrimi­nals keep finding new ways to steal money from victims using apps on official stores.

The actors behind the new campaign, the AsiaHitGro­up Gang, have been active since at least late 2016 with the distributi­on of the fake-installer applicatio­ns Sonvpay.A, which attempted to charge at least 20,000 victims — primarily from Thailand and Malaysia — for the download of copies of popular applicatio­ns.

In November last year, the Sonvpay.B campaign was discovered on Google Play. It used IP address geolocatio­n to confirm the country of the victim and added Russian victims to the billing fraud to increase its potential to steal from unsuspecti­ng users.

THREAT ACTIVITY

In the second quarter of 2018, McAfee Labs detected five new threats a second, including some showing notable technical developmen­ts that improve on the latest successful technologi­es and tactics to outmanoeuv­re their targets’ defences.

Ransomware: The total number of ransomware samples has increased by 57% over the past four quarters. Although the appearance of new ransomware families has slowed overall, establishe­d ransomware families such as Scarab have spawned new variants.

Mobile malware: New mobile malware samples increased 27% in the second quarter; this is the second successive quarter of growth. Users in South America reported the highest rate of infection, at 14%. Total mobile malware grew 42% in the past four quarters.

JavaScript malware: A 204% increase in new samples suggests that hackers have shifted to a new generation of JavaScript malware. After decreasing significan­tly over the last three quarters, JavaScript malware accounted for more than 7 million new samples, a record high, and up from around 2 million in the first quarter.

LNK malware: While PowerShell has been active among fileless malware developers, new samples slowed to 15% growth. But new LNK malware continues to grow, as cybercrimi­nals are increasing­ly using .lnk shortcuts to surreptiti­ously deliver malicious PowerShell scripts and other malware.

Spam botnets: The Gamut spam botnet outpaced all others in the second quarter. Most notably, it pushed high volumes of “Canada Revenue Agency” phishing scams. Notable recent campaigns were related to bogus employment offers that are commonly used as a “money mule” recruitmen­t tactic.

Although the appearance of new ransomware families has slowed overall in recent quarters, establishe­d ransomware families have spawned new variants.

Newspapers in English

Newspapers from Thailand