BlackBerry Partners With Intel to Launch a Cryptojacking Detection System

Published at: June 17, 2020

Software company and former smartphone manufacturer, BlackBerry, has partnered with Intel to launch a crypto mining and cryptojacking detection system for Intel-based commercial computers.

According to the announcement, BlackBerry released “BlackBerry Optics v2.5.1100”, which relies on the BlackBerry Optics Context Analysis Engine, or CAE, to leverage CPU telemetry from Intel Threat Detection Technology to provide enterprises with advanced malware software. This software’s main purpose is to detect cryptojacking attempts.

On how the system works, representatives from BlackBerry sent the following comment to Cointelegraph:

“BlackBerry and Intel have teamed up to provide a robust defense against cryptojackers in a way unique in the security industry. BlackBerry has integrated the Intel vPro TDT driver and machine learning model into BlackBerry Optics, our AI-driven EDR tool. This integration offers users a way to quickly detect and respond to cryptomining activity at the hardware level, without the need to access the application itself. This provides the ability to introspect applications like a web browser without a plugin, and a virtual machine from the host OS.”

Works on Windows 10

As there is virtually no processor impact, organizations could use the software to mitigate and detect such threats with “greater precision and consistent results”. The software works across all types of workloads executing on the Windows 10 operating system.

BlackBerry quotes a study previously reported by Cointelegraph called the “Verizon 2020 Data Breach Investigations Report”. This report states that around 10% of organizations received (and blocked) cryptocurrency mining malware at some point throughout the year.

Representatives from BlackBerry told Cointelegraph:

“Cryptojacking continues to be a big concern for organizations because it is often paired with malware and on its own is considerably less obtrusive than cyber threats like ransomware. This means it can go undetected for long periods of time. Threat actors have devised multiple ways to deliver crypotojacking malware to a wide variety of devices, which complicates detection and remediation efforts.”

Cryptojacking as an increasing threat

Josh Lemos, VP of research and intelligence at BlackBerry Cylance, stated that given the cost associated with mining cryptocurrency and the payments of ransomware demands on the decline, cryptojacking becomes “an attractive option” for threat actors to generate revenue:

“With our new cryptojacking detection and response capabilities, we’re looking to make this practice a thing of the past, providing enterprises and their employees with a turn-key solution that will enable them to thwart cryptojacking attempts and ensure their software and hardware are used for their intended purposes.”

Additionally, Stephanie Hallford, Intel’s vice president of the client computing group and general manager of business client platforms, said the following:

“Building on top of the built-for-business Intel vPro platform, enabled by Intel Hardware Shield, BlackBerry takes advantage of hardware visibility to offer advanced security protection, and we applaud them for this release.”

Cointelegraph reported on June 6 about data published by Russian cybersecurity firm Kaspersky. This data indicates that Singapore has seen a significant increase in the prevalence of attempted cryptojacking attacks during the first quarter of 2020.

On April 6, cybersecurity researchers identified a persistent and ambitious campaign that targets thousands of Docker servers daily with a Bitcoin (BTC) miner.

Tags
Related Posts
Researchers Detect Ambitious Bitcoin Mining Malware Campaign Targeting 1,000s Daily
Cybersecurity researchers have identified a persistent and ambitious campaign that targets thousands of Docker servers daily with a Bitcoin (BTC) miner. In a report published on April 3, Aqua Security issued a threat alert over the attack, which has ostensibly “been going on for months, with thousands of attempts taking place nearly on a daily basis.” The researchers warn: “These are the highest numbers we’ve seen in some time, far exceeding what we have witnessed to date.” Such scope and ambition indicate that the illicit Bitcoin mining campaign is unlikely to be “an improvised endeavor,” as the actors behind it …
Technology / April 6, 2020
‘Invisible God’ Amassed Millions Selling Corporate Data
A new report shows that a Kazakhstani hacker built a million dollar fortune by breaching private networks and selling their data. Researchers at threat intelligence company, Group-IB, said that the hacker, who operates under the pseudonym “Fxmsp,” began promoting their services across darknet. They posted data for sale on hacking-related forums, offering valuable resources stolen from private corporate networks. Some customers have taken to calling the hacker “The invisible god of networks.” Millionaire profits for Fxmsp According to the report, the magnitude of Fxmsp’s cybercriminal business is enormous. They reportedly accumulated $1.5 million in profits over three years by targeting …
Technology / June 24, 2020
Devs at Blogging Platform Ghost Take Down Crypto-Mining Malware Attack
Developers at blogging platform Ghost have spent the past 24 hours fighting a crypto mining malware attack. Announced in a status update on May 3, the devs revealed that the attack occurred around 1:30 a.m. UTC. Within four hours, they had successfully implemented a fix and now continue to monitor the results. No sensitive user data compromised Yesterday’s incident was reportedly carried out when an attacker targeted Ghost’s “Salt” server backend infrastructure, using an authentication bypass (CVE-2020-11651) and directory traversal (CVE-2020-11652) to gain control of the master server. The Ghost devs have said that no user credit card information has …
Technology / May 4, 2020
Cryptojacking Attacks Are Seriously Underestimated, Says BlackBerry VP
Cryptojacking attacks are both an internal and external threat, as the hacking groups are getting more organized in attempts to exploit vulnerabilities in the networks. However, there are also cases where some admins use valid entitlements to make money from illegally mining crypto using the firm’s network resources, and many organizations “don’t have great visibility” about it, says Josh Lemos, VP of research and intelligence at BlackBerry. Lemos told Cointelegraph that a crypto mining software is not necessarily malicious but rather opportunistic utilizing compute resources for monetary gain, "although you often find it paired with malicious software,” and it’s also …
Blockchain / Aug. 1, 2020
Consumer-Targeted Cryptojacking Is ‘Essentially Extinct’: Research
Illicit crypto mining — or cryptojacking — against consumers “is essentially extinct,” declares a report released by cybersecurity company MalwareBytes on April 23. Per the report, after in-browser mining service CoinHive shut down in early March — when the team claimed that the project had become economically inviable — cryptojacking against consumers has sharply decreased. At the same time, the number of such attacks targeting businesses increased from the last quarter. Furthermore, MalwareBytes also notes that bitcoin (BTC) holders who use Electrum wallets on a Mac have lost over $2.3 million in stolen coins to a Trojanized version of the …
Bitcoin / April 27, 2019