Attacks Involving Bitcoin Malware Declining in 2015, States Kaspersky
Moscow, Russia-based online security firm Kaspersky Lab has published one fresh report according to which, bitcoin malware continued to be distributed during 2014, however, there has been a drop in the incidences of its assault. Normally, malicious e-mails are used to execute these assaults, which install ransomware on PCs followed with asking for bitcoin payments for removing the malware alternatively restoring access of the locked files.
Specifically, Kaspersky's report for the 2nd quarter i.e. Q2-2015 about Internet security breach indicates attacks involving bitcoin malware as being behind 9% of money-related malicious programs identified. Moreover, malware stealing sums from bitcoin stocks were behind 6% of the programs detected. This, in contrast to Q2-2014 report of Kaspersky, shows illegitimate bitcoin malware as being behind 14% of Internet malware whilst theft from bitcoin stocks accounted for 8%.
A few months back, several government agencies and organizations reportedly got victimized from computer hackers who demanded ransom payments in bitcoin. For e.g. Cryptowall a bitcoin ransomware caused approximately $18m in money given away. The perpetrators are creating problem in giving themselves in since the anonymous nature of bitcoin transactions make their traces unobtainable.
At that time Kaspersky had indicated the Bitcoin malware's extraordinariness as having certain connection with its value established in the market. Amazingly, in 2013, the Bitcoin digital currency found enormous rise within its exchange value vis-à-vis United States dollar. Bitcoin value, during October 2013, rose to $1,200, but in the subsequent year, it dropped to less than $200.
Incidentally, Kaspersky's report notes an 83% of monetary related malicious programs as being associated with banking malware.
During the second quarter, the Global Research and Analysis Team of Kaspersky Lab revealed 4 cyber-espionage schemes namely Duqu 2.0, Hellsing, Naikon and CozyDuke. Those victimized included commercial organizations, government agencies along with other high-profile entities.
Moreover, in Q2, cyber-criminals demonstrated a preference for small-and-medium sized businesses (SMB) - previously, the Grabit cyber-espionage campaign targeted such SMBs. They concentrated on the agriculture, education, nanotechnologies, chemical, construction and mass media forms of economic sectors.
Kaspersky further states that there was a minimum of one hack into 40% of computers worldwide during Q2.
» SPAMfighter News - 8/10/2015