Countering Crypto Malice

“The steady addition of a constant amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended.”

- Satoshi Nakamoto, Bitcoin/Blockchain Developer

Malware (malicious software) can be defined as a computer program designed to harm systems or networks by taking partial control of its operationality.

Though it is incapable of damaging your physical hardware or network, malware can steal, encrypt, or delete its data at will. It can also alter or hijack core computer functions, as well as monitor computer activity without user knowledge or permission.


Cryptic Software

Over the past two fiscal years, there has been a 235% increase in cyberattacks against organizations of all sizes (business, education, healthcare, government) due to a shift from the use of traditional malware to cryptominers.

More recently, cryptojacking has superseded the pre-2018 predominance of cyberattacks against individual (home) computers. The primary motivation for this shift in attack approach is financial. The transactional nature of cryptojackers makes it easier for cybercriminals to compromise entire organizations. This translates into higher ransom demands which, when met, may prevent full systemic shutdowns.

Malicious Apps

Though cybercriminals have eased off attacking home computers, they have redirected their attacks toward personal mobile devices via pre-installed malapps (malicious apps).

After hijacking a device, cybercriminals can transmit paid messages and collect the revenue. Other malapps disperse adware that collects ad impressions and illegal downloads via forced redirects. However, with a bit of craftiness, you can catch and counter thes malapp attacks and more by:

  • Downloading apps from reputable app stores only (App Store, Galaxy Store, Google Play)
  • Carefully reading permissions requested by apps (to avoid data compromise)
  • Checking for app logos that mimic well-known brands for legitimacy
  • Installing a mobile security app from Malwarebytes or Symantec
  • Routinely backing up sensitive and pertinent information
  • Regularly updating your mobile device(s)

Trusted Tech Team is an accredited Microsoft CSP Direct Bill Partner, carrying multiple Solutions Partner designations and the now-legacy Microsoft Gold Partner competency. Based in Irvine, California, we report trends affecting IT pros everywhere.

If your organization uses Microsoft 365 or Azure, you may be eligible to receive a complimentary savings report from a Trusted Tech Team Licensing Engineer. Click here to schedule a consultation with our team now to learn how much you can save today.

Subscribe to the Trusted Tech Team Blog

Get the latest posts delivered right to your inbox

Kahlil Crawford

Kahlil Crawford

Writer & Strategist

Read More