{"id":17371,"date":"2020-01-08T08:00:06","date_gmt":"2020-01-08T16:00:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11107\/"},"modified":"2020-01-08T08:00:06","modified_gmt":"2020-01-08T16:00:06","slug":"news-11107","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11107\/","title":{"rendered":"INTERPOL Collaboration Reduces Cryptojacking by 78%"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 08 Jan 2020 14:40:55 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-1024x682.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Cybercriminals are often seen as having the upper hand over the \u201cwhite hat\u201d community. After all, they\u2019re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there\u2019s one secret weapon the good guys have: <strong>Collaboration<\/strong>. That\u2019s why Trend Micro has always prioritized its partnerships with law enforcement, academia, governments and other cybersecurity businesses.<\/p>\n<p>We\u2019re proud to have contributed to yet another successful collaborative operation with <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/INTERPOL-led-action-takes-aim-at-cryptojacking-in-Southeast-Asia\">INTERPOL<\/a> Global Complex for Innovation (IGCI) in Singapore that\u2019s helped to reduce the number of users infected by cryptomining malware by 78%.<\/p>\n<p><strong>Cryptomining On The Rise<\/strong><\/p>\n<p>Also known as cryptojacking, these attacks have become an increasingly popular way for cybercriminals to make money.<\/p>\n<p>Why?<\/p>\n<p>Because victims don\u2019t know they\u2019ve been infected. The malware sits on their machine in the background mining for digital currency 24\/7\/365. Increasingly, hackers have taken to launching sophisticated attacks against enterprise IT systems and cloud servers to increase their mining and earning potential. But many still target home computer systems like routers, as these are often left relatively unprotected. Stitch enough of these devices together in a botnet and they have a ready-made cash cow.<\/p>\n<p>That\u2019s why cryptojacking remained the most detected threat in the first half of 2019 in terms of file-based threat components, <a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-evasive-threats-pervasive-effects.pdf\">according to our data.<\/a><\/p>\n<p>Unlike serious data breaches, phishing attacks, ransomware and banking Trojans, cryptojacking doesn\u2019t have major impact on the victim. They don\u2019t lose sensitive personal data, there\u2019s no risk of follow-on identity fraud and they\u2019re not extorted for funds by being locked out of their PC.<\/p>\n<p>However, it\u2019s not without consequences: Cryptomining malware can slow your home network to a crawl while running up serious energy bills. It may even bring your home computers to a premature end. Also, there\u2019s always the risk with any kind of malware infection that hackers may switch tactics and use their footprint on your home machines to launch other attacks in the future.<\/p>\n<p><strong>Enter Operation Goldfish Alpha<\/strong><\/p>\n<p>That\u2019s why we were keen to offer our assistance to INTERPOL during this year\u2019s Operation Goldfish Alpha. Thanks to our broad global visibility into attack trends and infection rates, we were able to articulate the scale of the cryptojacking threat and key mitigation steps, at a pre-operation meeting with ASEAN law enforcement officers in June.<\/p>\n<p>A few months later, we developed and disseminated a key <em>Cryptojacking Mitigation and Prevention<\/em> guidance document. It details how a vulnerability in MikroTik routers had exposed countless users in the region to the risk of compromise by cryptomining malware. The document explains how to scan for this flaw using Trend Micro HouseCall for Home Networks, and how HouseCall can be used to detect and delete the Coinhive JavaScript that hackers were using to mine for digital currency on infected PCs.<\/p>\n<p><strong>Spectacular Success<\/strong><\/p>\n<p>Over the five months of Operation Goldfish Alpha, experts from national Computer Emergency Response Teams (CERTs) and police across 10 countries in the region worked to locate the infected routers, notify the victims and use our guidance document to patch the bugs and kick out the hackers.<\/p>\n<p>Having helped to identify over 20,000 routers in the region that were hacked in this way, we\u2019re delighted to say that by November, the number had reduced by at least 78%.<\/p>\n<p>That\u2019s the value of partnerships between law enforcement and private cybersecurity companies: They combine the power of investigative policing with the detailed subject matter expertise, visibility and resources of industry experts like us. We\u2019ll continue to lend a hand wherever we can to make our connected, digital world a safer place.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/interpol-collaboration-reduces-cryptojacking-by-78\/\">INTERPOL Collaboration Reduces Cryptojacking by 78%<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/interpol-collaboration-reduces-cryptojacking-by-78\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 08 Jan 2020 14:40:55 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-1024x682.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/12\/kazuend-AFp6M-Cj0Kk-unsplash-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Cybercriminals are often seen as having the upper hand over the \u201cwhite hat\u201d community. After all, they\u2019re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there\u2019s one secret weapon the good guys have: Collaboration. That\u2019s why Trend Micro has always prioritized its partnerships with law&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/interpol-collaboration-reduces-cryptojacking-by-78\/\">INTERPOL Collaboration Reduces Cryptojacking by 78%<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[16415,4503,11854,10385,714],"class_list":["post-17371","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cryptojacking","tag-cybercrime","tag-interpol","tag-partners","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17371"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17371\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17371"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}