June 12, 2018 By David Bisson 2 min read

Users lost $1,148,763,000 in cryptocurrency to cyberthieves during the first half of 2018, a recent study found. The researchers explored various illicit forums on the Dark Web and uncovered a $6.7 million cybercrime economy that revolves around the theft of bitcoin, Etherem and other digital currencies.

In total, the report revealed more than 12,000 such marketplaces containing over 34,000 offerings for would-be crypto-thieves. These products range in value from just over $1 to $1,000, with an average cost of $224. The researchers identified $10 as the “sweet spot” price for the malware samples being sold in these Dark Web forums.

You Get What You Pay For

The authors of the report, titled “Cryptocurrency Gold Rush on the Dark Web,” noted that those prices reflect the purchaser’s level of technical expertise and the degree to which a given sample can evade detection.

“The average listing is likely relatively unsophisticated, and detectable with proper endpoint security,” the report stated. Higher-priced listings, the authors wrote, “enable a more technically proficient user to compile their own malware. While these are still detectable, they are capable of defeating common indicators of compromise (IOCs) and signatures.”

Of the offerings the researchers uncovered, cryptocurrency stealers were the most prevalent at 65 percent of total listings. Cryptojacking malware comprised around 10 percent of offerings on the Dark Web, while mining botnets and mobile malware packages represented just 3.3 percent and 1.6 percent, respectively.

Combating the Cybercrime Economy

The study’s authors advised businesses to protect themselves by deploying an endpoint security solution equipped with prevention and detection capabilities. They also recommended deploying an ad blocker on all endpoints to reduce the risk of attackers hijacking devices to harvest cryptocurrency and restricting access to important financial resources and bank accounts.

Basic security best practices also apply. For example, users should conduct extensive research before participating in a cryptocurrency exchange and create strong, unique passwords across services, the report noted.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today