Cryptojacking EN 02 PDF
Cryptojacking EN 02 PDF
Cryptojacking EN 02 PDF
Crypto-
jacking
ENISA Threat Landscape
Overview
This type of attack has not attracted much attention from law
enforcement agencies and its abuse is rarely reported , mainly because
2
3% 13% Other
18%
Jsecoin
XMRig
22% RubyMiner
Cryptoloot
21% Coinhive
WannaMine
2% 21%
9
Figure 1: Top cryptomining malware globally . Source: Check Point
2
__Findings
64,1_million cryptojacking hits by the end
of 2019
3
Kill chain
Cryptojacking
4
Cryptojacking
MORE INFORMATION
5
Trends
Coinhive’s place at the top has since been taken by Jsecoin (22%), XMRig
9
6
__Incidents
April 2019_Cryptojacking campaign dubbed Beapy,
exploited the EternalBlue vulnerability and affected
enterprises in China 3
7
Trends
8
_Monero remained the cryptocurrency of
choice
Similar to previous trends, Monero (XMR) was the cryptocurrency of choice
for 2019 cryptojacking activities. The reason is two-fold; first, Monero is
focused on privacy and anonymity and, therefore, the transactions cannot
be traced. Second, the Proof-of-Work algorithm is designed to make
mining viable with a standard CPU as opposed to specialized hardware. In
Q3 2019, 32% of exchanges traded privacy coins such as Monero.
However, in anticipation of new anti-money laundering regulations, many
exchanges opted to delist privacy coins.
9
Attack Vectors
_Techniques
Cyber criminals used the following techniques to run or deliver
cryptominers:
by incorporating cryptojacking capabilities in existing malware;
10
by compromising websites;
11
13
using social networks;
using mobile apps and app stores;
14
Browser-
based
mining
$30K
File-based
mining
$750K
3
Figure 3: How much can a coin-mining botnet make in 30 days? Source: Broadcom
10
_Proposed actions
11
References
1. Sergiu Gatlan. “Cryptominers Still Top Threat In March Despite Coinhive Demise.” April 9, 2019.
Bleeping Computer. https://www.bleepingcomputer.com/news/security/cryptominers-still-top-
threat-in-march-despite-coinhive-demise/
2. “Internet Organised Crime Threat Assessment (IOCTA).” 2019. EUROPOL.
https://www.europol.europa.eu/iocta-report
3. “Beapy: Cryptojacking Worm Hits Enterprises in China.” 24 April, 2019. BROADCOM.
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/beapy-cryptojacking-
worm-china
4. Bill Conner. “SONICWALL Cyber Threat Report.” 2020. SONICWALL
https://www.sonicwall.com/resources/2020-cyber-threat-report-pdf/
5. Yessi Bello Perez. “Unsuspecting victims were cryptojacked 52.7 million times in the first half of
2019.” July 24, 2019. TheNextWeb – HARD FORK.
https://thenextweb.com/hardfork/2019/07/24/cryptojacking-cryptocurrency-million-hits-first-
half-2019/
6. Ben Noble. “A Third of Cryptocurrency Exchanges Still Host Privacy Coins Despite Fears of
Impending FATF Travel Rule.” November 27, 2019. CIPHERTRACE
https://ciphertrace.com/ciphertrace-q3-2019-caml-press-release/
7. ”Defending Systems Against Cryptocurrency Miner Malware.” October 28, 2019. Trend Micro.
https://www.trendmicro.com/vinfo/be/security/news/cybercrime-and-digital-threats/defending-
systems-against-cryptocurrency-miner-malware
8. “Kaspersky Security Bulletin ’19 Statistics.” 2009. Kaspersky. https://go.kaspersky.com/rs/802-
IJN-240/images/KSB_2019_Statistics_EN.pdf
9. “CYBER SECURITY REPORT.” 2020. Check Point Research cp<r>.
https://www.checkpoint.com/downloads/resources/cyber-security-report-2020.pdf
10. Ionut Ilascu. “EternalBlue Exploit Serves Beapy Cryptojacking Campaign.” April 25, 2019.
Bleeping Computer. https://www.bleepingcomputer.com/news/security/eternalblue-exploit-
serves-beapy-cryptojacking-campaign/
11. “New mining worm PsMiner uses multiple high-risk vulnerabilities to spread.” March 12, 2019.
360 Total Security. https://blog.360totalsecurity.com/en/new-mining-worm-psminer-uses-
multiple-high-risk-vulnerabilities-to-spread/
12. Dan Thorp-Lancaster. “New drive-by cryptocurrency mining scheme persists after you exit
your browser window.” November 9, 2017. Windows Central.
https://www.windowscentral.com/new-drive-cryptocurrency-mining-scheme-persists-even-after-
you-exit-your-browser-window
13. Dr. Michaeal McGuire. “Social Media Platforms and the Cybercrime Economy.” 2019.
Bromium. https://www.bromium.com/wp-content/uploads/2019/02/Bromium-Web-of-Profit-
Social-Platforms-Report.pdf
14. Axelle Apvrille. “Abusing cryptocurrencies on Android smartphones.” 2019. Fortinet.
https://fortinetweb.s3.amazonaws.com/fortiguard/research/currency-insomnihack19.pdf
15. “2019 Midyear Security Roundup Evasive Treats Pervasive Effects.” 2019. TrendMicro
https://documents.trendmicro.com/assets/rpt/rpt-evasive-threats-pervasive-effects.pdf
16. Margi Murphy. “YouTube shuts down hidden cryptojacking adverts.” January 29, 2018. The
Telegraph https://www.telegraph.co.uk/technology/2018/01/29/youtube-shuts-hidden-crypto-
jacking-adverts/
17. Matthew Beedham. “New cryptocurrency mining malware is spreading across Thailand and
the US.” June 4, 2019. TheNextWeb – HARD FORK.
https://thenextweb.com/hardfork/2019/06/04/security-crypto-jacking-mining-malware/
18. Sean Lyngaas. “BlueKeep is back. For now, attackers are just using it for cryptomining.”
November 4, 2019. CyberScoop. https://www.cyberscoop.com/bluekeep-exploited-cryptomining/
12
19. Janus Agcaoili. “Monero-Mining Malware PCASTLE Zeroes Back In on China, Now Uses
Multilayered Fileless Arrival Techniques.” June 5, 2019. Trend Micro.
https://blog.trendmicro.com/trendlabs-security-intelligence/monero-mining-malware-pcastle-
zeroes-back-in-on-china-now-uses-multilayered-fileless-arrival-techniques/
20. Marie Huillet. “Researchers Say 50,000 Servers Worldwide Infected With Privacy Coin
Cryptojacking Malware.” May 29, 2019. Cointelegraph.
https://cointelegraph.com/news/researchers-say-50-000-servers-worldwide-infected-with-
privacy-coin-cryptojacking-malware
21. Johnlery Triunfante, Mark Vicente. “BlackSquid Slithers Into Servers and Drives With 8
Notorious Exploits to Drop XMRig Miner.” August 27, 2019. Trend Micro.
https://blog.trendmicro.com/trendlabs-security-intelligence/blacksquid-slithers-into-servers-and-
drives-with-8-notorious-exploits-to-drop-xmrig-miner/
22. “Malicious cryptojacking code found in 11 Ruby libraries.” August 2, 2019, Decrypt.
https://decrypt.co/8602/malicious-cryptjacking-code-found-in-11-ruby-libraries
23. Brook Chelmo. “Cryptojacking in 2019: Cryptocurrency Value Keeping Attack Vector in Play .”
August 6, 2019. SonicWall. https://blog.sonicwall.com/en-us/2019/08/cryptojacking-in-2019-
cryptocurrency-value-keeping-attack-vector-in-play/
24. Catalin Cimpanu. “Coinhive cryptojacking service to shut down in March 2019”. February 27,
2019. ZD Net. https://www.zdnet.com/article/coinhive-cryptojacking-service-to-shut-down-in-
march-2019/
25. Tom Hegel. “Making it Rain - Cryptocurrency Mining Attacks in the Cloud”. March 14, 2019.
AT&T Business. https://cybersecurity.att.com/blogs/labs-research/making-it-rain-cryptocurrency-
mining-attacks-in-the-cloud/
26. “How a Prominent Cryptomining Botnet is Paving the Way for a Lucrative and Illicit Revenue
Model”. August 2019. Carbon Black. https://www.carbonblack.com/resources/access-mining/
27. “Cryptojacking Attacks: Who’s Mining on Your Coin?”. April 5, 2019. Security Intelligence.
https://securityintelligence.com/cryptojacking-attacks-whos-mining-on-your-coin/
28. “Malware Creates Cryptominer Botnet Using EternalBlue and Mimikatz’. April 12, 2019.
Bleeping Computer. https://www.bleepingcomputer.com/news/security/malware-creates-
cryptominer-botnet-using-eternalblue-and-mimikatz/
13
Related
14
ENISA Threat Landscape Report
Sectoral and thematic threat
analysis
Contextualised threat analysis between
January 2019 and April 2020.
READ THE REPORT
15
About
_ The agency
The European Union Agency for Cybersecurity, ENISA, is the Union’s
agency dedicated to achieving a high common level of cybersecurity
across Europe. Established in 2004 and strengthened by the EU
Cybersecurity Act, the European Union Agency for Cybersecurity
contributes to EU cyber policy, enhances the trustworthiness of ICT
products, services and processes with cybersecurity certification schemes,
cooperates with Member States and EU bodies, and helps Europe prepare
for the cyber challenges of tomorrow. Through knowledge sharing,
capacity building and awareness raising, the Agency works together with
its key stakeholders to strengthen trust in the connected economy, to
boost resilience of the Union’s infrastructure, and, ultimately, to keep
Europe’s society and citizens digitally secure. More information about
ENISA and its work can be found at www.enisa.europa.eu.
Contributors
Christos Douligeris, Omid Raghimi, Marco Barros Lourenço (ENISA), Louis
Marinos (ENISA) and all members of the ENISA CTI Stakeholders Group:
Andreas Sfakianakis, Christian Doerr, Jart Armin, Marco Riccardi, Mees
Wim, Neil Thaker, Pasquale Stirparo, Paul Samwel, Pierluigi Paganini, Shin
Adachi, Stavros Lingris (CERT EU) and Thomas Hemker.
Editors
Marco Barros Lourenço (ENISA) and Louis Marinos (ENISA).
Contact
For queries on this paper, please use
[email protected].
For media enquiries about this paper, please use [email protected].
16
Legal notice
Notice must be taken that this publication represents the views and
interpretations of ENISA, unless stated otherwise. This publication
should not be construed to be a legal action of ENISA or the ENISA
bodies unless adopted pursuant to the Regulation (EU) No
526/2013. This publication does not necessarily represent state-of
the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not
responsible for the content of the external sources including
external websites referenced in this publication.
This publication is intended for information purposes only. It must
be accessible free of charge. Neither ENISA nor any person acting
on its behalf is responsible for the use that might be made of the
information contained in this publication.
Copyright Notice
© European Union Agency for Cybersecurity (ENISA), 2020
Reproduction is authorised provided the source is acknowledged.
Copyright for the image on the cover: © Wedia. For any use or
reproduction of photos or other material that is not under the
ENISA copyright, permission must be sought directly from the
copyright holders.
ISBN: 978-92-9204-354-4
DOI: 10.2824/552242
17
All rights reserved. Copyright ENISA 2020.
https://www.enisa.europa.eu