Crypto Miners Rule Top 10 List of Most Prolific Malware Threats

Crypto Miners Rule Top 10 List of Most Prolific Malware Threats

Crypto Miners Rule Top 10 List of Most Prolific Malware Threats

The three most common malware variants detected in April were crypto miners according to a news release on May 14. A global threat report has concluded this.

According to Check Point Research,  Cryptoloot malware that uses the victim’s computing power to mine for crypto without their knowledge, was last month’s biggest threat. The second place has XMRig an open-source software which is used for mining monero (XMR) with JSEcoin, a JavaScript miner embedded in websites in the 3rd place.

Despite their prevalence, the company’s researchers believe that criminals are shifting their focus away from crypto mining. Several popular services used to target unsuspecting computer users, such as Coinhive, have closed. In addition, the collapse in crypto prices at the start of the year meant other strategies were more lucrative.

According to Check Point, multi-purpose trojans are on the rise. Maya Horowitz, the company’s threat intelligence and research director, said:

“As these malware constantly morph, it is crucial to have a robust line of defense against them with advanced threat prevention.”

Leave a Comment