China's ransomware threatens the cryptocurrency of the hardest hit area to surge 85 times

Encrypted currency hijacking has skyrocketed. Symantec announced its latest "Internet Security Threat Report", saying that as cryptocurrency prices reversed in 2017, attacks on cryptocurrency mining will gradually become widespread.

Symantec's Internet Security Threat Report states that stealth cryptocurrency mining, also known as cryptographic hijacking, is increasingly becoming a threat, with hijacking activity on endpoint computers exploding by 8,500%.

Encrypted currency hijacking is the practice of secretly using the computing resources of another computer user to mine cryptocurrencies. This not only consumes the power paid by the victim, but also affects the performance of the device.

David Rajoo, director of systems engineering at Symantec in Malaysia, Indonesia and the Philippines, said: "Cryptographic currency hijacking poses an increasing threat to network and personal security."

Rajoo added: "A large number of profit incentives have caused people, equipment and organizations to face unauthorized cryptocurrants who are drawing resources from their systems, further stimulating criminal penetration, from home PCs to giant data centers. thing."

The shift to cryptocurrency mining has also led to a reduction in ransomware attacks and a different type of ransomware attack.

According to Symantec, the number of ransomware variants has increased by 46%, indicating that criminal groups have lower innovation capabilities but remain efficient.

Luo Shaohui, chief operating officer of Symantec Greater China, said that two-thirds of the victims of cryptocurrency hijacking are individual consumers, but predicting that the enterprise or corporate network will be targeted in the future.

China is the hardest hit by the ransomware threat. In 2017, China became the country most affected by ransomware in the Asia Pacific region. Compared with the 16th place in the world last year, China ranked second in the world in 2017.

Other attack vectors

In addition to the significant growth of encryption technology as a practice, Symantec also discussed other ways of attack.

According to Symantec, 71% of targeted attacks use spear phishing, which sends targeted emails to steal information from unsuspecting respondents.

Attacks on the software supply chain—implanting legitimate software from malware and staying in its normal online distribution location—increased from four attacks in 2016 to 12 attacks in 2017.

At the same time, new mobile malware variants have grown 54%, and Symantec says it blocks an average of 24,000 malicious mobile apps per day in 2017.

Take precautionary measures

Symantec recommends that consumers change the passwords on their devices and services to make it harder for hackers to attack them.

It is also helpful to be proficient in email, as email is the most important method of infection. Make sure that suspicious emails are not opened and deleted, especially if they have links or attachments.

Finally, keeping software and operating system updates will also prevent security vulnerabilities from being exploited.

Manual Pulse Generator

A manual pulse generator (MPG) is a device normally associated with computer numerically controlled machinery or other devices involved in positioning. It usually consists of a rotating knob that generates electrical pulses that are sent to an equipment controller. The controller will then move the piece of equipment a predetermined distance for each pulse.
The CNC handheld controller MPG Pendant with x1, x10, x100 selectable. It is equipped with our popular machined MPG unit, 4,5,6 axis and scale selector, emergency stop and reset button.

Manual Pulse Generator,Handwheel MPG CNC,Electric Pulse Generator,Signal Pulse Generator

Jilin Lander Intelligent Technology Co., Ltd , https://www.jilinlandermotor.com

Posted on