• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Crypto-Thieves Cost Victims 53 Times What They Make

You are here: Home / General Cyber Security News / Crypto-Thieves Cost Victims 53 Times What They Make
September 29, 2022

Threat actors make just $1 for just about every $53 they expense their victims in excess cloud computing expenditures, in accordance to a new report from Sysdig.

To determine its conclusions, the security vendor analyzed a one marketing campaign from the notorious crypto-jacking risk team acknowledged as TeamTNT, which used in excess of 10,000 compromised endpoints to mine for cryptocurrency.

It claimed to have identified $8120 in 10 crypto wallets employed in the marketing campaign, which resulted in more cloud expenses of $430,000 for the victims. That operates out at all around $53 in damages for just about every $1 in cryptocurrency mined, whilst there could have been extra wallets utilised in the campaign that Sysdig did not find out.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On the other hand, damages from crypto-jacking extend outside of additional cloud computing charges.

It is claimed that the additional pressure servers are set under can use out components quicker, forcing owners to spend in alternative package. It can also sluggish down the pace at which they run, which may result in disruption to IT operations and the consumer-experiencing expert services operating on them, with a resulting monetary and reputational impact on the victim business.

Illicit cryptocurrency mining is most frequently reached via cloud and container compromises, in accordance to Sysdig.

Crypto-miners, backdoors and other malware are normally inserted into public repositories disguised as reputable program, exactly where they are unwittingly downloaded by DevOps groups, the vendor reported.

It claimed that 36% of destructive Docker Hub photos consist of crypto-miners.

“Security groups can no for a longer time delude by themselves with the concept that containers are much too new or much too ephemeral for danger actors to bother,” said Stefano Chierici, senior security researcher at Sysdig.

“Attackers are in the cloud, and they are getting actual money. The significant prevalence of crypto-jacking action is attributable to the very low risk and superior reward for the perpetrators.”


Some pieces of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News IRS Warns of “Industrial Scale” Smishing Surge
Next Post: Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks hackers aid protests against iranian government with proxies, leaks and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.