Main Menu

Stay Connected

Join my mailing list and stay informed of all the lasted news and blog posts!

Get Social

The practice of stealthily mining cryptocurrency on other people’s devices has beocme pervasive, and overtook ransomware as a tool of choice for extorting money online.
The Check Point Threat Index shows that Coinhive, malware that steals CPU cycles on someone’s device in order to mine cryptocurrencies has become the most prevalent form of malware on the Internet. Add the third most prevalent cryptojacking malware Cryptoloot and this is the No. 1 infection.

Steal someone’s computing power by embedding such code in websites or software, and you can make money. Steal enough, and you can make a lot.

“The problem,” explains Lotem Finkelstein, a threat intelligence analysis team leader at Check Point, “is that [cryptojacking is] simply everywhere—on websites, servers, PCs, and mobile.” Check Point says that it’s affected as many as 55 percent of organizations globally, while security researchers at Wanderaclaiminstances on mobile devices increased by 287 percent between October and November of last year.

And guess what the most-used infection vector is? You got it: phishing.

Leave your comments

Post comment as a guest

Your comments are subjected to administrator's moderation.
terms and condition.
  • No comments found

Site Disclaimer


The content provided with this site is for article purposes only.
All images and content (C) the original authors.

Contact Me

Contact Me

I'm excited to hear from you!

You can contact me via my Contact Page. If you'd prefer to give me a ring you can always call me at: 6052901990

My Address

923 N Main St. Aberdeen, South Dakota, United States 57401

Get Social

Newsletter Subscribe