Survey Reveals 87% of IT Professionals Are Concerned With Cryptojacking

Published at: March 31, 2020

Singapore-based unicorn startup Acronis released its latest cybersecurity survey on March 31 today, highlighting that 86% of IT professionals are concerned about cryptojacking.

According to the 2020 World Cyber Protection Week Survey, there is a growing fear among IT experts in the face of cryptojacking attacks, as the study shows that 30% of personal users and 13% of professional users wouldn't know if their data or computer's resources were modified unexpectedly, as such threat does.

The report also stresses that awareness and concerns about cyber-threatening methods like cryptojacking have been increasing in the last two years, surging by 33% since 2019.

There is also a growing fear among IT experts in the face of ransomware attacks. In fact, 88% of those surveyed said they were concerned about this modality, surpassing cryptojacking by only 2 percentage points.

Cryptojacking definition

Cryptojacking is the unauthorized use of a third-party device to mine cryptocurrencies. It can be a computer, smartphone, or a complete network of equipment.

Cryptojacking can break the security of a computer in two ways: introducing malware by installing suspicious applications or from websites that use the device's resources without the user's consent.

Peak volume of coronavirus-related scams in Asia

In general terms, the survey highlighted a peaking volume of COVID-19 related cyber scams in Asia during the last two weeks, with Singapore being the most affected country on the continent.

To keep safe, Acronis recommended always creating backups of valuable data, ensuring that operating systems and applications are updated and being aware of suspicious emails or websites.

Is cryptojacking technically extinct?

Contrary to what Acronis’ survey found, Cointelegraph reported last year that MalwareBytes considers cryptojacking against consumers “essentially extinct.”

Tags
Related Posts
Cryptojacking Code Found in 11 Open Libraries, Thousands Infected
A cryptojacking code was found in 11 open-source code libraries written in Ruby, which have been downloaded thousands of times. Hackers downloaded the software, infected it with malware, and subsequently reposted it on the RubyGems platform, industry news outlet Decrypt reported on Aug. 21. The malicious code was first noticed by a GitHub user, who posted about the issue on Aug. 19. He said that, when executed, the library downloaded additional code from text hosting service Pastebin, which then triggered the malicious mining. The malware also sent the address of the infected host to the attacker, alongside environment variables which …
Blockchain / Aug. 21, 2019
Malware Shellbot is Now Capable of Shutting Down Other Miners
The Shellbot cryptojacking malware has gone through an update and come out with some new capabilities, technology news website TechCrunch reported on May 1. Per the report, these findings come from Boston-based cybersecurity firm Threat Stack. The company claims that Shellbot, which was first discovered in 2005, has received a major update. The original Shellbot was capable of brute-forcing the credentials of SSH remote access services on Linux servers protected by weak passwords. The malware then mines privacy-focused monero (XMR). Threat Stack claims that this new-and-improved version is capable of spreading through an infected network and shutting down other miners …
Blockchain / May 1, 2019
Consumer-Targeted Cryptojacking Is ‘Essentially Extinct’: Research
Illicit crypto mining — or cryptojacking — against consumers “is essentially extinct,” declares a report released by cybersecurity company MalwareBytes on April 23. Per the report, after in-browser mining service CoinHive shut down in early March — when the team claimed that the project had become economically inviable — cryptojacking against consumers has sharply decreased. At the same time, the number of such attacks targeting businesses increased from the last quarter. Furthermore, MalwareBytes also notes that bitcoin (BTC) holders who use Electrum wallets on a Mac have lost over $2.3 million in stolen coins to a Trojanized version of the …
Bitcoin / April 27, 2019
New Linux-Targeting Crypto-Mining Malware Combines Hiding and Upgrading Capabilities
Japanese multinational cybersecurity firm Trend Micro has detected a new strain of crypto-mining malware that targets PCs running Linux, according to a report published Nov. 8. The new strain is reportedly able to hide the malicious process of unauthorized cryptocurrency-mining through users’ CPU by implementing a rootkit component. The malware itself, detected by Trend Micro as Coinminer.Linux.KORKERDS.AB, is also reportedly capable of updating itself. According to the report, the combination of hiding and self-upgrading capabilities gives the malware a great advantage. While the rootkit fails to hide the increased CPU usage and the presence of a running crypto-mining malware, it …
Blockchain / Nov. 13, 2018
Report Shows Cryptojacking Is Prime Example of Shift Towards Discreet Cyberattacks
Cybercriminals are reportedly favoring unhurried approaches in attacks made for financial gains, with cryptojacking as a prime example of this shift. IT news website ComputerWorld reported on this development on March 14. Data released by cybersecurity company Darktrace reveals that cryptojacking attempts increased by 78 percent in 2018, and, according to ComputerWorld, the company also said that this trend continued in 2019. The ComputerWorld article cites Max Heinemeyer, director of threat hunting at Darktrace, commenting on the findings. He reportedly said that since many ransomware victims may be unable to pay a ransom in Bitcoin (BTC) due to technical ineptitude, …
Blockchain / March 14, 2019