Security Market Segment LS
Monday, 03 September 2018 08:00

Miners increasingly being downloaded by botnets: study

By
Miners increasingly being downloaded by botnets: study Pixabay

The percentage of cryptocurrency miners downloaded by botnets in the second half of 2017 and the first half of 2018 has increased as attackers increasingly use this kind of malware to benefit from infiltrating machines, the security firm Kaspersky Lab says.

Based on a study of material being downloaded by botnets to victim machines during the 12 months cited, Kaspersky Lab researcher Alexander Ermin said that backdoors made up the bulk of downloads, showing that the botnet operators wanted to gain the best possible control over infected devices.

The study did not count update files that were downloaded by bots and also excluded configuration files. Only files that were judged to be unique by their MD5 hash files were counted and the study covered more than 60,000 different command and control servers associated with 150 bot families and their variants.

Ermin also found that the number of download droppers — programs that secretly install malicious programs, built into their code, on a computer — was also increasing, an indication that multi-stage and more complex attacks were on the rise.

While a decrease was recorded in the number of banking trojans downloaded, Ermin said this could not be taken as an overall reduction in numbers as this category of trojans was often delivered by droppers.

kaspersky botnets

Another trend noticed was that botnets appeared to be increasingly leased by people depending on their needs. In many cases, the actual specialist task that the botnet was built for could not be identified.

The total unique malicious files downloaded was 16,213 in the second half of 2017 and 13,858 for the first half of 2018. A chart of the top 10 malware for each period shows that a backdoor known as njRAT made up 5.2% of downloads in the first half of 2018. njRAT also had the most command and control servers, with a presence in 99 countries.

For the second half of 2017, a botnet known as Lethic was the top download, with 17%.

Graphic: courtesy Kaspersky Lab

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.

REGISTER HERE!

LAYER 1 ENCRYPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & WEBINARS

REVIEWS

Recent Comments