11-22-2024
BSV
$67.31
Vol 148.73m
-9.42%
BTC
$98871
Vol 108684.72m
0.85%
BCH
$490.6
Vol 1291.15m
-6.18%
LTC
$90.5
Vol 1128.39m
0.72%
DOGE
$0.39
Vol 10278.46m
2.27%
Getting your Trinity Audio player ready...

Cryptojacking is a rapidly growing problem worldwide, as scammers increasingly choose malicious crypto mining scripts over ransomware for fleecing their victims. But new research appears to confirm the true scale of the problem, and it’s even worse than many commentators had feared.

According to research published by cybersecurity experts at Guardicore Labs, a new script has infected as many as 50,000 separate servers worldwide, mining an obscure privacy-focused token without the knowledge of its hosts.

The script runs in the background on infected computers, draining resources while driving up energy bills. Many victims don’t even realize their systems are infected until it is too late, with scammers able to make off with tidy sums and a lower chance of detection compared to other frauds.

The scammers are increasingly turning to turtlecoin (TRTL) mining, with this particular campaign evident for at least four months.

The team first detected the scam back in April, and were able to identify its origins and growth. Their research shows the malware may have “infected up to 50,000 Windows MS-SQL and PHPMyAdmin servers over the past four months,” with over 700 new victims being pulled into the scam net every single day.

According to the researchers, the malware bears hallmarks of an attack emanating from China, or Chinese speakers, after Chinese language strings were identified in log files and binaries.

In their research, Guardicore Labs said the targeted servers already spanned systems across a number of key industries.

“Breached machines include over 50,000 servers belonging to companies in the healthcare, telecommunications, media and IT sectors. Once compromised, the targeted servers were infected with malicious payloads. These, in turn, dropped a crypto-miner and installed a sophisticated kernel-mode rootkit to prevent the malware from being terminated,” according to the report.

Their findings show the majority of victims to be located in China, India and the United States, with the suggestion that victims in as many as 90 countries may have been affected.

Interestingly, the report confirms that organizations are still exhibiting basic security weaknesses, saying “this campaign demonstrates once again that common passwords still comprise the weakest link in today’s attack flows.”

Recommended for you

David Case gets technical with Bitcoin masterclass coding sessions
Whether you're a coding pro or a novice, David Case's livestream sessions on the X platform are not to be...
November 21, 2024
NY Supreme Court’s ruling saves BTC miner Greenidge from closing
However, the judge also ruled that Greenidge must reapply for the permit and that the Department of Environmental Conservation has...
November 20, 2024
Advertisement
Advertisement
Advertisement