BSV
$68.03
Vol 168.5m
-10.78%
BTC
$99091
Vol 101979.82m
1.96%
BCH
$494.17
Vol 1606.76m
-5.85%
LTC
$90.09
Vol 1240.66m
-0.38%
DOGE
$0.39
Vol 9890.63m
1.86%
Getting your Trinity Audio player ready...

Hackers are using cryptojacking malware as a cover for more serious attacks, according to a report published by security researchers at Microsoft.

In a paper published by the tech company’s intelligence team, malicious actors are fronting attacks with cryptojacking scripts to present a decoy from more significant attacks, namely credential theft.

The report identifies a malicious group called BISMUTH, which has attacked a number of targets linked to governments in Vietnam and France in recent weeks. Ostensibly these have presented as cryptojacking attacks, harnessing excess processing power to mine for digital currency.

However, the report says this is merely generating incidental income for the group, while they focus on the real target of their efforts—the theft of credentials which allow access to sensitive government systems.

The group have deployed the attacks using a cryptojacking script that mines for Monero, the secretive privacy coin often associated with hacking attacks and illegality. According to the researchers, the script is somewhat more conspicuous than they would ordinarily expect, with minimal efforts made to cover tracks.

The paper said this strategy “allowed BISMUTH to hide its more nefarious activities behind threats that may be perceived to be less alarming because they’re ‘commodity’ malware.”

According to Microsoft, this fits the group’s preferred MO, one of “hiding in plain sight.” The report concludes by urging organizations to be aware of the risks of cryptojacking as a decoy, and to take steps to identify and prevent attacks of this kind from taking hold.

Monero cryptojacking as an attack in its own right has exploded in recent years, infecting systems around the world to divert processing power to mining cryptocurrency for hacking groups.

The more sophisticated style exhibited by BISMUTH is further cause for concern for organizations safeguarding sensitive state information, as well as threatening core systems for public administration.

See also: Blockchain Intelligence Group’s presentation at CoinGeek Live, “Blockchain Intelligence: Analytics, Forensics & Compliance Tools for Bitcoin SV

Recommended for you

Blockchain enables autonomous AI agents to learn
Utilizing blockchain tech, a group of Belgian scientists enabled autonomous AI agents to learn and communicate securely, contributing to the...
September 17, 2024
WhatsOnChain gets own UTXO endpoints for BSV blockchain services
With ElectrumX set to retire in October, WhatsOnChain is gearing up to implement a new UTXO set of API endpoints,...
September 16, 2024
Advertisement