Malicious cryptocurrency miners: Status and Outlook

01/29/2019
by   Radhesh Krishnan Konoth, et al.
0

In this study, we examine the behavior and profitability of modern malware that mines cryptocurrency. Unlike previous studies, we look at the cryptocurrency market as a whole, rather than just Bitcoin. We not only consider PCs, but also mobile phones, and IoT devices. In the past few years, criminals have attacked all these platforms for the purpose of cryptocurrency mining. The question is: how much money do they make? It is common knowledge that mining Bitcoin is now very difficult, so why do the criminals even target low-end devices for mining purposes? By analyzing the most important families of malicious cryptocurrency miners that were active between 2014 and 2017, we are able to report how they work, which currency they mine, and how profitable it is to do so. We will see that the evolution of the cryptocurrency market with many new cryptocurrencies that are still CPU minable and offer better privacy to criminals and have contributed to making mining malware attractive again -- with attackers generating a continuous stream of profit that in some cases may reach in the millions.

READ FULL TEXT
research
02/09/2020

Profit from Two Bitcoin Mining Tactics: Towing and Shutdown

Since Bitcoin's inception in 2008, it has became attractive investments ...
research
05/13/2019

Analyzing "Not-a-Virus" Bundled Adware: The Wajam Case

Case studies on malicious code mostly focus on botnets and worms (recent...
research
10/14/2022

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

Malware affecting Internet of Things (IoT) devices is rapidly growing du...
research
05/13/2019

Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case

Comprehensive case studies on malicious code mostly focus on botnets and...
research
01/07/2020

A Prevention and a Traction System for Ransomware Attacks

Over the past three years, especially following WannaCry malware, ransom...
research
04/14/2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network

Stubborn mining attack greatly downgrades Bitcoin throughput and also be...
research
05/05/2021

Current State of IPv6 Security in IoT

This report presents the current state of security in IPv6 for IoT devic...

Please sign up or login with your details

Forgot password? Click here to reset