dsm-crypto-359089-edited

According to a survey published by Chainalysis, cryptojackers are by far the most successful malware kind for stealing crypto assets.

Cryptojackers account for 5% of all Monero mining

Cryptojackers are a sort of malware that is mistakenly placed on a victim’s device and takes the device’s computational resources in order to mine crypto assets. The report discusses the challenges of recognizing transactions that benefit the attackers:

Because funds are going directly from the mempool to mining addresses unknown to us, rather than from the victim’s wallet to a new wallet, passively collecting data on cryptojacking activities is more challenging than it is for other forms of cryptocurrency-based crime. However, we are aware that that is a major issue.

Although Chainalysis admits that not all of these transactions could be precisely recognised, cryptojackers generate at least 73% of all money through crypto-related malware. Cryptojacking is projected to contribute 5% of Monero’s overall hashrate.

While not particularly harmful in and of itself, cryptojackers frequently connect to a command-and-control server, which may also instal other types of malware. To avoid being shut down by authorities, one of the botnets uncovered by Chainalysis uses encoded messages on the Bitcoin blockchain to update its command-and-control servers.

800 USD for an information thief bot

Trojans are the second-largest source of illicit revenue from malware, followed by info stealers and cutters. However, the distinctions between these malware kinds become blurred because Trojans are frequently used as a gateway to download other types of malware as well.

Hackers use any software to steal sensitive information, such as account credentials or private keys, referred to as an info stealer. According to the report, the info stealer Redline is being sold for $800 USD on a Russian hacker site.

Clippers are used to modify the victim’s clipboard content. When a victim duplicates a wallet address, hackers employ this malware kind to insert their own address, rerouting the transaction to their wallet. As a result, it is always prudent to double-check the recipient address before initiating any crypto transaction.

Previous article5 Types of Poker that Keep It New and Interesting
Next articleThe Velas Project Verve becomes a huge success after release