Casa > cibernético Notícias > iPhones Increasingly Targeted by Cryptomining Malware
CYBER NEWS

iPhones cada vez mais visadas por Cryptomining Malware

iOS e MacOS foram por muito tempo acreditava invencível, mas fatos e as estatísticas revelam uma outra verdade. De acordo com uma pesquisa nova marca, há um perto 400% aumentar em cryptomining ataques contra iPhones. This upsurge has been registered in the last two weeks of September, when attacks against the Safari browser also increased significantly, Check Point said. The attacks were delivering the infamous Coinhive malware.




Most Popular Malware for September 2018

Cryptomining Attacks Against Apple Devices on the Rise

According to Check Point’s findings, cryptomining continues to be a prevalent threat for global organizations. It should also be noted that the attacks on Apple devices haven’t adopted any new functionalities, despite the sudden surge. Researchers have not concluded why this is happening, and point out that the security of mobile devices is often disregarded in organizations. In order to prevent them from being the weak point in corporate security, mobile devices should be protected efficiently via threat prevention solutions, o relatório notas.

The Coinhive malware, em particular, is now affecting 19% of global organizations. Another piece of malicious software that has been widely deployed in attacks is the Dorkbot Trojan, which the report puts in second place in terms of global impact after Coinhive.

[wplinkpreview url =”https://sensorstechforum.com/dorkbot-malware-2012-resurfaces-becomes-major-threat/”]Dorkbot is in fact a 6-year-old banking malware that has resurfaced in the wild to become a major threat, security reports recently revealed.

The Dorkbot banking malware started its malicious activity back in 2012 but now it seems that the malware has started attacking financial institutions once again.

Dorkbot is designed to drop multiple files, no %Dados do aplicativo% e %temp% diretórios, and among those files are worm infection files, that allow it to automatically spread across different machines. Dorkbot may also heavily modify the Windows registry sub-keys, as Microsoft report. The malware primarily attacks the Run and RunOnce sub-keys, where it creates registry entries for all of its executable files to automatically run upon launching Windows.

Other notable malware pieces that made in Check Point’s most recent malware analysis include [wplinkpreview url =”https://sensorstechforum.com/cryptoloot-coinhive-monero-miner-remove-pc/”]Cryptoloot, Andrômeda, [wplinkpreview url =”https://sensorstechforum.com/millions-computers-infected-cryptocurrency-miners/”]Jsecoin, [wplinkpreview url =”https://sensorstechforum.com/roughted-malvertising-ad-blockers/”]Roughted, [wplinkpreview url =”https://sensorstechforum.com/german-nuclear-plant-hit-by-w32-ramnit-and-conficker-worms/”]Ramnit, [wplinkpreview url =”https://sensorstechforum.com/vmprotect-vmprotectss-exe-xmrig-monero-cpu-miner-remove/”]XMRig, Conficker, e [wplinkpreview url =”https://sensorstechforum.com/emotet-trojan-protection-guide/”]Emotet:

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...