Cyptocurrency Resource Theft

Cyber criminals hijacking computing resources to mine for cryptocurrencies are increasing their attempts to bypass business security controllers. Researchers have discovered Illicit cryptocurrency mining or cryptojacking becoming popular with cyber offenders as a simple method to finance their operations because the increased popularity and value of blockchain based currencies grow.

The attacks normally involve malware that’s used to install valid cryptocurrency mining applications on targeted programs and send the generated electronic coins to pockets controlled by the offenders.

Firms are seeing  CPU functionality issues, increased processor burnout and unusually high power consumption.

The assault was dubbed RedisWannaMine since it’s powered by an open source Redis in-memory data construction shop and the EternalBlue exploit utilized by WannaCry. RedisWannaMine shows worm-like behavior together with innovative controls to grow the attackers’ disease rate and coin creation capacity.

They tracked down RedisWannaMine via a remote code execution (RCE) discovered by Imperva’s internet software detectors.

A shell script file used in the assault is a downloader that’s very similar to older cryptojacking downloaders from how it downloads a crypto miner malware in an outside place and profits persistency and remote accessibility.

If you feel your servers or network may be infected, contact our IT Consultants at CCNY Tech at ccnytech.com or call us at 315-292-1046. Our IT engineers have the right tools to detect attacks and monitor future issues.