Security News

iPhone a Growing Target of Crypto-Mining Attacks

The apple products specifically iPhone is the growing target for crypto-mining attacks, according to Check Point, iPhone attacks has increased by nearly 400% over the last two weeks in the September.

In the recent published Global Threat Index, Check Point researchers said that they are into this and will continue to fully investigate the main motive behind this increasement but also they had reported that the crypto-miners will continue to be the most common malware in the September 2018.

Currently Coinhive impacts around 19% of the global organizations, and the researchers has also reported that the information-stealing Trojan Dorkbot held onto the second place with around 7% of the global impact. The report has also talked about that the Coinhive attacks are also increasing attacks against the PCs.

The malicious attackers are using Coinhive mining malware which helps them to target the iPhones, which are straight forward to raise the attacks against the users for the Safari browser, it’s the primary browser which is used by the Apple devices.

This mining malware which is known as Cryptoloot, it has ranked as third place overall on the Threat Index, where it made its place to the second most prevalent crypto-miner in the index. While differentiating itself from the Coinhive, the Cryptoloot that requests a smaller revenue percentage from the websites than its top competitor.

“Crypto-mining continues to be the most dominant threat that we are facing in the organizations globally,” Maya Horowitz, threat intelligence group manager at Check Point, said in the press release. “What is the most interesting in the fourfold increase in attacks against the iPhone and against the Apple devices are not using new functionality, so we are continuing to investigate the possible reasons behind this development.”

“In the meantime, attacks such as these serve as a reminder that mobile devices are an often-overlooked element of an organization’s attack surface, so it’s critical that these devices are protected with a comprehensive threat prevention solution, to stop them being the weak point in the corporate security defenses.”

The Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow (CVE-2017-7269) was the top most exploited vulnerability for the seventh-consecutive month, with a report of the global impact around of 48% of the organizations.

Related Articles

Leave a Reply

Back to top button