May 13, 2025
Trending News

Crypto Mining Attacks Gaining Strength in Turkey

  • September 22, 2022
  • 0

In Q2 2022, Kaspersky solutions detected 40,788 new miner customizations. According to data from Kaspersky Security Network in Turkey, the number of business users affected by cryptominers increased

Crypto Mining Attacks Gaining Strength in Turkey

In Q2 2022, Kaspersky solutions detected 40,788 new miner customizations. According to data from Kaspersky Security Network in Turkey, the number of business users affected by cryptominers increased in the second quarter of 2022 compared to the previous quarter.

Crypto mining is a process in which users use computers, data, code, and calculations to verify cryptocurrency transactions and earn cryptocurrency in return for their work. Crypto mining is extremely time consuming and expensive. That’s why cybercriminals are looking for ways to do this job on other people’s machines.

Attackers use compromised devices to generate cryptocurrency without the device owners’ knowledge. For example, they can steal their resources by sending users a legitimate-looking email encouraging them to click on a link that executes the code that embeds an encryption script or program. Another method is by injecting a script into the website or injecting ads on multiple websites. The script runs automatically when the target user visits the website or appears in infected ad browsers. No codes are stored on victims’ computers.

Eight Separate Apps Secretly Mining Cryptocurrencies in 2019 Using Others’ Resources from the Microsoft Store DELETED. Crypto Theft Code on the Los Angeles Times Murder Report Page in 2018 discovers. Also in 2018, CoinHive miner was found to be featured in YouTube ads through Google’s DoubleClick platform.

Data from Kaspersky Turkey shows that the number of computers affected by crypto mining software in the corporate sector increased by 11 in the second quarter of 2022 compared to the first quarter. During this period, the number of attackers’ attempts to run cryptominers in the enterprise segment has increased by 22.

Kaspersky Security Researcher David Emmasay: “Previously, crypto mining attacks targeted desktops and laptops, and sometimes Android smartphones as well. Today, crypto thieves are expanding into servers, networks, and even IoT devices. Because the servers are more powerful than regular computers and allow more mining capacity. We consider the reason why we see different levels of mining activity in different regions, the different levels of cryptocurrency adoption in countries and fluctuations in cryptocurrency rates. As the value of the cryptocurrency rises, the activity of attackers using miners increases.”

Kaspersky experts recommend the following for individual and business users to protect themselves from crypto mining attacks:

  • Use trusted endpoint cybersecurity solutions such as Kaspersky Total Security for home users, Endpoint Detection and Response for business users, and Kaspersky Endpoint Security for Business.

  • Install the latest software updates and patches for your operating system and all your applications, especially web browsers.

  • Be wary of the latest crypto theft trends. Cyber ​​criminals are constantly changing methods and developing new forms of delivery to place updated scripts and programs on your computer system. Organizations can save resources by investing in managed detection and response solutions such as Kaspersky MDR, enabling a team of professional cybersecurity experts to proactively respond to incidents and keep the latest cybersecurity threats out of reach.

  • Use industrial cybersecurity solutions to prevent crypto mining on smart manufacturing devices and IoT devices.

  • Use browser extensions designed to block Cryptojacking: such as minerBlock, No Coin, and Anti Miner. You can install them as extensions on popular browsers.

  • Disable JavaScript. Disabling JavaScript while browsing online can prevent encrypted code from infecting your computer.

Source: (BYZHA) – Beyaz News Agency

Source: Haber Safir

Leave a Reply

Your email address will not be published. Required fields are marked *