iPhones Increasingly Targeted by Cryptomining Malware
NEWS

iPhones Increasingly Targeted by Cryptomining Malware

iOS and macOS were long believed invincible but facts and statistics reveal another truth. According to a brand new research, there is a near 400% increase in cryptomining attacks against iPhones. This upsurge has been registered in the last two weeks of September, when attacks against the Safari browser also increased significantly, Check Point said. The attacks were delivering the infamous Coinhive malware.




Most Popular Malware for September 2018

Cryptomining Attacks Against Apple Devices on the Rise

According to Check Point’s findings, cryptomining continues to be a prevalent threat for global organizations. It should also be noted that the attacks on Apple devices haven’t adopted any new functionalities, despite the sudden surge. Researchers have not concluded why this is happening, and point out that the security of mobile devices is often disregarded in organizations. In order to prevent them from being the weak point in corporate security, mobile devices should be protected efficiently via threat prevention solutions, the report notes.

The Coinhive malware, in particular, is now affecting 19% of global organizations. Another piece of malicious software that has been widely deployed in attacks is the Dorkbot Trojan, which the report puts in second place in terms of global impact after Coinhive.

Dorkbot, a 6-year-old banking malware has resurfaced in the wild to become a major threat, according to recent reports. The Dorkbot banking malware reportedly started its malicious activity back in 2012 but now it seems as if this virus has...Read more
Dorkbot is in fact a 6-year-old banking malware that has resurfaced in the wild to become a major threat, security reports recently revealed.

The Dorkbot banking malware started its malicious activity back in 2012 but now it seems that the malware has started attacking financial institutions once again.

Dorkbot is designed to drop multiple files, in the %AppData% and %Temp% directories, and among those files are worm infection files, that allow it to automatically spread across different machines. Dorkbot may also heavily modify the Windows registry sub-keys, as Microsoft report. The malware primarily attacks the Run and RunOnce sub-keys, where it creates registry entries for all of its executable files to automatically run upon launching Windows.

Other notable malware pieces that made in Check Point’s most recent malware analysis include

What is CryptoLoot Monero Miner malware? How to remove CryptoLoot Coinhive Monero miner malware? How to protect yourself from miner malware in the future?
Cryptoloot, Andromeda,
Researchers signal that cryptocurrency miners are being used against computer victims worldwide, read on to learn more about the issue.
Jsecoin,
RoughTed is a large-scale malvertising campaign which saw a peak in March this year but has been active for at least over a year.
Roughted,
Ransomware has been hitting hospitals and putting the well-being of patients at risk for several months now. Attacking healthcare institutions is bad enough. What could be worse? India Times just reported that a nuclear plant in Germany has been infected...Read more
Ramnit,
What is VMProtectss.exe Monero miner? How to remove the VMProtectss.exe miner malware completely from your computer and prevent it from mining Monero?
XMRig, Conficker, and
Our article illustrates some of the techniques that victims can use to remove certain strains of the Emotet banking Trojan
Emotet:

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...