Check Point: crypto miners are malware
Check Point: crypto miners are malware
Check Point Software Technologies LTD, a leading cyber security service provider, has found in a recent report that crypto-mining poses a threat to users. According to the JavaScript Miner CoinHive is the world's sixth most used malware.
In a press release, Check Point presents its latest Global Threat Impact Index report, explicitly focusing on the outcomes of crypto-miners' threats. Accordingly, the use of crypto-mining as sheep software for other computers, especially in the course of October has increased again.
In an investigation, Check Point found that crypto-miners could be used to, in the worst case, claim up to 65% of end-users' computing power without the consent or even knowledge of that end-user. The most dangerous was the CoinHive Miner, which occupies the sixth place on the index. This is designed to miner the crypto currency Monero when visiting a website, without the consent of the user is required. The deduction of the computing power of the computer used, its overall performance is significantly affected.
Maya Horowitz, Threat Intelligence Group Manager at Check Point, considers the development of mining hardware to be a malware worrying. It believes that the emergence of malware in miners must result in a rethinking of cybersecurity. It calls for the protection and prevention to be expanded and raised to a new level by its own technology. This would create an efficient network against cybercrime. Although crypto-mining is a pity and does not go unnoticed, the impact is not less.
Post a Comment