Cases of cyber attacks in cryptomining are apparently the most common in Southeast Asia. Kapersky has blocked at least 8,926,117 attack attempts in 2020.
Furthermore, Kapersky also suspects crypto mining activities through the office electricity left by WFH employees. So, if the office electricity bill increases unnaturally. Then it’s best to check the company’s IT backend. There are high chances of crypto miners using your business resources, at your own expense.
Cyber in Cryptomining is The Highest
Hacking cases for mining Bitcoin are apparently highest, when compared to detected phishing attempts (2,890,825) and ransomware attempts (804,513) in the last year.
In Kaspersky’s recent 2020 MSME Threat Report, monitored crypto mining efforts decreased to 8,926,117 in 2020 from a massive 13,247,796 detections in 2019.
“We’ve seen a decline in crypto mining attacks worldwide. and the same trend also applies in Southeast Asia. However, Kaspersky still advises business owners not to be careless, “said EPleader of the Malware Analyst Team at Kaspersky vgeny Lopatin in an official statement, Monday (21/6).
As for the Southeast Asia region, Indonesia and Vietnam are the countries that have experienced the most crypto mining efforts that Kaspersky has monitored and prevented for two consecutive years. Accounts for nearly 71 percent in 2020 and 80 percent in 2019 of all attempted incidents in the Southeast Asia region.
These cybercriminals carry out their actions secretly for a long period of time in order to get maximum profit.
Tips for Securing Company IT Systems
- Keep the operating system and software in good condition and updated regularly.
- Do not click on links and email attachments from unverified and untrusted sources.
- Be careful when installing software from the web as crypto miners are known to embed malware in them.
- Carry out regular security audits of your corporate network. And you should also pay attention to “invisible” targets, such as queue management systems, POS terminals, and vending machines. Once infected, all these devices can bring a lot of advantages to cybercriminals.