Technology

Corporate users in META region impacted by Crypto miners

As many as 11% corporate users were affected by crypto miners in the Middle East, Turkey and Africa (META region). Among them 6% were from the UAE, a research paper from Kaspersky said.

Cybercriminals use the processing power of the victim’s computer to mine cryptocurrency, with an income reaching up to $40,500 (2 BTC) per month, the study said.

According to the research at Kaspersky, making money using crypto miners has been profitable for cybercriminals as they don’t pay for equipment or electricity, which is rather expensive in 2022.

“They install mining software on the victim’s computer to use its processing power without the user’s consent. It does not require much specialist technical expertise,” these researchers opined.

Andrey Invanov, a security expert with Kaspersky said: “Although these are not the best days for the cryptocurrency industry, the topic has been in the spotlight throughout the year, so it’s not surprising that malicious actors would want to profit from these trends.”

“The silver lining is that while the number of threats is rising, there are no dramatic changes in the number of users encountering miners. That is why it is imperative to raise awareness about the first signs that malware is being downloaded onto your computer. It is also necessary to install a reliable security solution that will prevent attacks at an early stage,” he added.

The attacker must know how to create a miner using open-source code or where to buy one. If the crypto mining malware is installed successfully on the victim’s computer, it provides its operator with steady earnings. This year saw a sharp increase in new modifications to malicious mining programs.

New Miners Doubled

The experts have identified 215,843 new miners during the first three quarters of 2022, more than twice as many as last year. Most of the analysed samples of malicious mining software (48%) secretly mine Monero (XMR) currency via the victim’s computer.

This currency is known for its advanced technologies that anonymise transaction data to achieve maximum privacy. Those monitoring it cannot decipher addresses trading Monero, transaction amounts, balances, or transaction histories – all these factors immensely appeal to cyber criminals.

Most frequently, attackers distribute miners through malicious files masquerading as pirated content – films, music, games and software. At the same time, unpatched vulnerabilities pose a severe challenge to users while being an appealing lure for cybercriminals who exploit them to spread to miners, the researchers added.

Global Business Magazine

Recent Posts

Iraq Signals Rapid Oil Export Recovery Once Key Shipping Route Reopens

Basra officials say output can rebound within days as Hormuz disruption continues to weigh on…

12 hours ago

UAE Unveils Landmark R&D Tax Incentive Framework to Boost Innovation Economy

New regime offers up to 50% tax relief, setting the stage for research-led growth and…

2 weeks ago

Dubai’s Bankers Assess Post-Conflict Reality as Economic Pressures Mount

Tourism slowdown, real estate stress, and financial volatility drive calls for policy intervention Nearly a…

2 weeks ago

Dubai Strengthens Supply Chain Resilience: Dubai Chambers, DP World & Dubai Customs Engage 100 Companies

In a strategic move to reinforce global trade resilience and enhance logistics efficiency, Dubai Chambers,…

3 weeks ago

Dubai Real Estate Sales Plunge Over 40% Amid Middle East Conflict, Investors Turn Cautious

Dubai’s once-booming real estate sector is witnessing a sharp slowdown, with property sales dropping by…

3 weeks ago

Dubai luxury property market brings developer sales of AED10.92 billion in March

Keturah analysis shows developer transaction volume climbed 42% YoY with a week of the month remaining…

3 weeks ago