Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Stockpiling cryptocurrencies painting target on large businesses

by The Gurus
August 15, 2018
in Editor's News
Share on FacebookShare on Twitter

Three in 10 (30%) large UK businesses have admitted to being hit by cryptomining attacks within the previous month[i], according to new figures released today.

The research, commissioned by Citrix and carried out by OnePoll, quizzed 750 IT decision makers across the UK regarding the growing risks of cryptomining cyber-attacks.

A recent study found that 50 per cent of large UK businesses are stockpiling cryptocurrencies – often to provide a quick means of payment should they be subjected to a ransomware attack. Yet such measures are seemingly painting a target on those businesses for ‘crypto-miners’.

This new poll found 59 per cent of respondents had detected cryptomining attacks on their systems at some point, with four in five (80%) of those occurring in the last six months. Just 38% of respondents believe they’ve never been subjected to a cryptomining attack.

For those that have fallen victim to this kind of attack, over a third (38%) discovered it though their network monitoring solutions, while one in three (34%) were alerted by employees and nearly one in five (16%) discovered it through a spike in slower device performance. Anti-malware software alerted IT leaders in just 7 per cent of scenarios.

The figures indicate that attacks typically affect up to 50 devices, with three in five (60%) businesses reporting this to be the case. Just over one in 10 (11%) of respondents reported over 100 devices being affected following their most recent cryptomining attack.

Only two thirds (67%) of organisations have a formal policy in place should they be subjected to a cryptomining attack. Those without policies are mostly relying on network monitoring solutions (44%), anti-malware solutions (41%) and ‘blocking’ mining websites (24%) to mitigate an attack. One in five (21%) businesses have no contingency measures in place, should an attack occur.

Chris Mayers, chief security architect, Citrix, said:

“The threat of a ransomware attack is still very real for large businesses. Many organisations have therefore invested in cryptocurrencies as a means of payment to restore their data as quickly and efficiently as possible. However, in an somewhat unfortunate vicious circle, this stockpiling of potentially valuable currency has now made them a target – and businesses appear slow to react to this threat, with many yet to put formal plans in place should they fall victim to an attack.

“Centralising data storage and management should form a key part of such plans, ensuring organisations keep their customer data and critical IP far from devices and end-points with possible vulnerabilities. This gives cyber-attackers fewer opportunities to gain leverage and demand ransoms – saving businesses from costly expenses, as well as supporting with long-term compliance for regulations such as the GDPR.”

[i] The study was conducted between 3rd May to 14th May 2018, so this will refer to the time period of up-to 30 days prior to this.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Israel launches three-year program to boost cyber industry

Next Post

86% of websites at risk from hackers for simple security oversight

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information