Home > Cyber News > iPhones Increasingly Targeted by Cryptomining Malware

iPhones Increasingly Targeted by Cryptomining Malware

iOS and macOS were long believed invincible but facts and statistics reveal another truth. According to a brand new research, there is a near 400% increase in cryptomining attacks against iPhones. This upsurge has been registered in the last two weeks of September, when attacks against the Safari browser also increased significantly, Check Point said. The attacks were delivering the infamous Coinhive malware.

Most Popular Malware for September 2018

Cryptomining Attacks Against Apple Devices on the Rise

According to Check Point’s findings, cryptomining continues to be a prevalent threat for global organizations. It should also be noted that the attacks on Apple devices haven’t adopted any new functionalities, despite the sudden surge. Researchers have not concluded why this is happening, and point out that the security of mobile devices is often disregarded in organizations. In order to prevent them from being the weak point in corporate security, mobile devices should be protected efficiently via threat prevention solutions, the report notes.

The Coinhive malware, in particular, is now affecting 19% of global organizations. Another piece of malicious software that has been widely deployed in attacks is the Dorkbot Trojan, which the report puts in second place in terms of global impact after Coinhive.

[wplinkpreview url=”https://sensorstechforum.com/dorkbot-malware-2012-resurfaces-becomes-major-threat/”]Dorkbot is in fact a 6-year-old banking malware that has resurfaced in the wild to become a major threat, security reports recently revealed.

The Dorkbot banking malware started its malicious activity back in 2012 but now it seems that the malware has started attacking financial institutions once again.

Dorkbot is designed to drop multiple files, in the %AppData% and %Temp% directories, and among those files are worm infection files, that allow it to automatically spread across different machines. Dorkbot may also heavily modify the Windows registry sub-keys, as Microsoft report. The malware primarily attacks the Run and RunOnce sub-keys, where it creates registry entries for all of its executable files to automatically run upon launching Windows.

Other notable malware pieces that made in Check Point’s most recent malware analysis include [wplinkpreview url=”https://sensorstechforum.com/cryptoloot-coinhive-monero-miner-remove-pc/”]Cryptoloot, Andromeda, [wplinkpreview url=”https://sensorstechforum.com/millions-computers-infected-cryptocurrency-miners/”]Jsecoin, [wplinkpreview url=”https://sensorstechforum.com/roughted-malvertising-ad-blockers/”]Roughted, [wplinkpreview url=”https://sensorstechforum.com/german-nuclear-plant-hit-by-w32-ramnit-and-conficker-worms/”]Ramnit, [wplinkpreview url=”https://sensorstechforum.com/vmprotect-vmprotectss-exe-xmrig-monero-cpu-miner-remove/”]XMRig, Conficker, and [wplinkpreview url=”https://sensorstechforum.com/emotet-trojan-protection-guide/”]Emotet:

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree