Cryptomining is still on the first place in the 2019 top 10 malware threat

Cryptomining malware is nothing more than tools for illegally mining Monero and other cryptocurrencies.
Companies appear to be the most affected entities by this type of malware and they will remain like this if no new threat data appears.
Miners are the thirteenth month in a row in the first place. They are used in all cyber attacks that involve the use of crypto mining process. The Coinhive cryptocurrency miner is once again the most prevalent sample of malware, impacting 14% of the companies worldwide.

Not surprisingly the other four most active tools from the top 10 most prevalent malware samples were crypto miners too.
Despite the overall decline in the value of major cryptocurrencies, this type of malware remains the most used one because the main advantage of the crypto mining malware for the hacker is its ability to create direct profit without any user interaction and without elaborate mechanisms like in the cases of ransomware and banking Trojans.

Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;
Even more, worrying is the fact that in many cases, users with systems infected with cryptocurrency malware don’t realize they have a problem until hardware performance gets severely damaged.

This kind of user behavior is a reality because the malware works silently in the background on personal computers, mobile phones, servers, and basically any machine with computing power.
The most exploited vulnerabilities are also related to illegal crypto mining activity, whit the main one being CVE-2017-7269, a buffer-overflow vulnerability in a Microsoft IIS component that was first disclosed nearly two years ago. This flaw remains a popular exploit tool because it gives the hacker a way to infiltrate high-end servers with lots of processing power for crypto mining.

Notably for this beginning of the year is the sudden reemergence of SmokeLoader, a malware downloader tool that hackers have previously used to distribute especially pernicious malware tools, such as Trickbot and Panda banking Trojan and the AZORult information-stealer.
For companies, this sudden re-emergence of the malware tool that is eight years ago highlights need to raise their vigilance. Meaning that the companies should have the most up to date and advanced cybersecurity solutions applied.

The top also includes Emotet, a Trojan that is being used for malware distribution, and Ramnit, a banking Trojan that has been around for some time.

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs.
If we analyze this top we see that the same threats tend to remain on the list month after month, though occasionally there are sudden surges of specific threats.

Cybersecurity experts say that now in the cyberspace there is a very wide range of threats, from multiple attack web-vectors to malicious email and vulnerabilities.

We would continue to monitor this cybersecurity problem. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.