Share

Crypto-jacking: Newer, stealthier, and needing tougher IT security

Crypto-jacking is a new step in the evolution of malware monetisation. One of the first successful malware formulas was banking malware, where banking credentials were communicated back to cyber criminals. However, the conversion of credentials into cash is not an easy one.

Ransomware was another step which made the process simpler – victims would wire money directly. However, ransomware is losing its effectiveness as computer users start to be aware of the danger, and improve their security and backup procedures.

Crypto-jacking – the unauthorised use of someone else’s computer to mine cryptocurrency – has one main advantage over these two. If well designed, the mining process can run in the background without consuming all available resources.

In the best case, the user will be unaware that there is any extra processing going on. This makes it almost a "victimless crime" in the sense that the user may not be aware that there is a problem, as opposed to having a computer completely disabled, losing precious documents, or having money stolen from bank accounts.

Continued evolution

The down side for the cyber-criminal is that he/she needs a lot of victims to gain enough resources to make any real profits. Ultimately, that will be the factor which decides whether we see it continue as an attack vector, or whether its popularity diminishes as new techniques are found, and the evolution continues.

So how should these newer forms of attack, which directly cost the affected company, influence a company's IT security practices?

Risk management

Deciding on the right approach to cyber security is essentially a risk management process. Companies need to conduct detailed reviews covering the assets that may be at risk, the protection mechanisms in place, and the potential damage to the company should those assets be stolen or destroyed.

Assets may be information-based (files, credentials, databases) or, as more devices such as video cameras and physical security access systems become connected to the corporate network, they may also be physical property.

The damage to the company in the event of an attack may also be difficult to assess. Monetary losses, from paying the ransomware, may be easy to determine; but what about loss of documents or related recovery costs? And most difficult, what about the cost due to reputational damage, and legal liabilities caused by loss of customer data?

Crypto-jacking damages

Crypto-jacking losses are less tangible. Servers which are mining in the background will have limited resources for dealing with real work, and productivity will be affected. Customer experience can also be degraded on public-facing servers.

These losses, whilst difficult to value, can be significant, and it becomes more important than ever to put in place a complete security solution covering all parts of the customer network. This may include access to the cloud - not only covering protection against attack, but also continually monitoring security "health" to identify potential weak points.

Most importantly, there must be monitoring of the complete IT infrastructure, in order to identify any breaches, and deal them before the real damage is done.

* Simon Bryden is a consulting system engineer at Fortinet. Views experssed are his own.

We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
18.86
+0.8%
Rand - Pound
23.60
+0.8%
Rand - Euro
20.24
+0.8%
Rand - Aus dollar
12.34
+0.5%
Rand - Yen
0.12
+1.5%
Platinum
924.00
-0.2%
Palladium
975.00
-1.6%
Gold
2,346.20
+0.6%
Silver
27.58
+0.5%
Brent Crude
89.01
+1.1%
Top 40
69,121
+1.0%
All Share
75,054
+1.0%
Resource 10
62,696
+0.9%
Industrial 25
103,560
+1.0%
Financial 15
15,960
+1.0%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders