Stay Ahead of Cryptojacking Malware with Cofense’s Malware Intelligence

Cofense’s malware intelligence service provides accurate and timely alerts about cryptojacking malware and ransomware being circulated in phishing emails. Subscribe to our malware intelligence service and stay ahead of email-borne threats in order to better protect your network, your data, and your users. Sign up for complimentary threat alerts here.

How much would a successful ransomware attack cost your organization? $2.4 million? $3.8 million? How about $7.35 million? These are the average costs incurred to recover from ransomware attacks depending on whether you agree with Accenture ́s, Microsoft ́s or IBM ́s calculations. Scary, isn’t it?</p

Even scarier is that ransomware may not be your biggest problem. Several security companies have reported “cryptojacking” is growing in popularity among cyber criminals due to it being a cheaper, less-risky-yet-more-profitable form of malware than ransomware. Furthermore, it’s virtually undetectable.

Think Like
a Cybercrook

This special report focuses
on the realities of phishing
and recommends defenses
you can use to reduce your risk.

Read More

What is Cryptojacking?

Cryptojacking definition: Crypto-jacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Cybercriminals infect computers with a crypto-mining code that works in the background, mining cryptocurrency and delivering it to attackers as unsuspecting victims use their computers normally.

Although individual computers don ́t yield much processing power on their own, attackers can build a botnet of infected devices and make them work together – harnessing vast processor resources across a network of infected computers and stealing a small amount of bandwidth from each.

The cost to the organization is the loss of performance, or – if operating in the cloud – the cost of provisioning more resources to cope with greater processing demands. However, the latest strains of crypto-jacking malware have the built-in ability to crash victims ́ computers if they attempt to remove it.

How is Cryptojacking Malware Deployed?

It will come as no surprise to learn the most common way computers are infected is via phishing emails. Cybercriminals send the phishing emails to unsuspecting victims, inviting them to click on a link, which either downloads the crypto-mining code directly, or redirects the victim to a compromised website.

The compromised website could be entirely genuine except for an injected script that automatically executes, and will therefore fail to appear on URIBL or SURBL blacklists.  Cryptojacking detection is difficult for anti-virus software because scripts are constantly changing.

Although some security solutions are waking up to the threat of crypto-jacking, there is no perfect cryptojacking blocker. The best way to avoid becoming a victim of this malware strain is to stay ahead of the phishing methods being used to deploy cryptojacking, and the best way to stay ahead is with Cofense’s malware intelligence service.

1:1 Demo
Powerful Solutions

We'll talk with you about your company's
specific needs and provide
demonstrations of our
recommended solutions.


Cofense’s Malware Intelligence Service

Cofense’s malware intelligence reports are compiled from millions of suspicious emails we receive daily through our Cofense Reporter service and other sources. The Cofense Triage service filters out false positives and spam emails, leaving only genuine threats for our team of analysts.

Once genuine threats are verified and confirmed, we issue detailed malware intelligence reports that not only alert organizations to new or emerging threats, but that also inform them of the URLs of compromised websites so access to the malware can be blocked by web filtering applications.

Organizations can choose how they receive our malware intelligence reports. We distribute them by email and as Machine-Readable Threat Intelligence reports that can be read by Security Information and Event Management applications (SIEMs) and Threat Intelligence Programs (TIPs).

Stay Ahead of Cryptojacking Malware and Other Email-Borne Threats with Cofense

The speed with which our malware intelligence reports are distributed enables organizations to act quickly to stay ahead of email-borne threats – not only threats related to cryptojacking, but all formats of malware and ransomware, and other phishing attempts that could have serious consequences.

Cofense integrates seamlessly with more than twenty common security solutions in order that threats can be blocked faster through automation, while the depth of intelligence provided enables security teams to better understand the nature of the threats and their potential impact.

To find out more about Cofense’s malware intelligence service, do not hesitate to contact us. Our team will be happy to organize a free demo of Cofense in action for you to better understand how your organization can stay ahead of email-borne threats with malware intelligence reports from Cofense.