home.aspx
 
. Resources/Whitepapers/c398fa1e-2ce2-44a3-ac8e-4adf6b996610_KasperskySecuri_wp.pdf
whitepaper
KASPERSKY SECURITY BULLETIN 2018 STORY OF THE YEAR: MINERS
Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals. Only in the case of miners, it might be quite a while before the user notices that 70–80% of their CPU or graphics card power is being used to generate virtual coins. Encrypted documents and ransomware messages are far harder to miss. Cryptominers usually find their way onto user computers and corporate machines along with adware, hacked games, and other pirated content. What’s more, the present “entry threshold” — that is, the actual process of creating a miner — is rather low: cybercriminals are assisted by ready-to-use affiliate programs, open mining pools, and miner builders. DOWNLOAD