Accessing Your Crypto Wallet Through Android Devices?


Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming to note that cyber criminals deploy malicious APKs that are delivered through SMS spam and cryptocurrency miners into people’s mobile devices and the modus operandi is similar to that of Windows malware. In fact, attackers find it quite easy to add miners to apps that are already malicious. For example, cyber criminals could easily add miners on apps that were infected with the Loapi Trojan, an SMS Trojan that could deliver ads. Loapi caused a high degree of strain on the processor, which caused overheating of the batteries which, in turn, shortened the lifespan of the Androids.

Android miners as well as Mac miners often use official mining websites such as Minergate. While it is expected that apps downloaded from trusted websites are usually safe, this may not always be the case. Nowadays, even trusted applications are getting hacked. A typical example of this scenario was how cyber criminals hacked the MacUpdate website and delivered OSX.CreativeUpdate, a Mac cryptocurrency miner, to Mac systems.

[You might also like: The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners]

As of now, incidences of ransomware attacks are on the low side- a trend that we are observing since the second half of 2017. Business ransomware has shown a sharp increase, as Q1 2018 witnessed the advent of new ransomware called the Hermes, Gandcrab, and the Scarabey. Interestingly, Cerber and Locky, which used to dominate the ransomware scene some time back, now seems extinct.

Cyber criminals used two exploit kits, namely, Grandsoft EK and RIG EK to distribute Gandcrab, which was first identified in January of this year. Recently, RIG has emerged as a remarkable exploit kit because of the fact that it has been diversified into numerous types of payloads. On the other hand, Grandsoft was believed to have disappeared, but it created a stir when it was used to deliver GandCrab. Cyber criminals have also delivered GandCrab via EI Test malware campaigns and Necurs email spam. Interestingly, GandCrab has been used to access Dash wallets rather than Bitcoin wallets, which are more widespread. This clearly indicates that cyber criminals are typically targeting cryptocurrencies that have lower transaction fees compared to Bitcoin.

Read the “2018 C-Suite Perspectives: Trends in the Cyberattack Landscape, Security Threats and Business Impacts” to learn more.

Download Now

Fabio Palozza

Fabio is Technical Director EMEA-CALA, responsible for Systems Engineering in the theater. With a long experience, he began his career in software development for aerospace systems before getting into IT vendor ecosystem with Bay Networks/Nortel and Juniper Networks, up to being Technical Director EMEA for the Telecom, Cloud and Content businesses. Fabio writes about technology strategy, trends and implementation.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center