SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Carmen Gonzalez, Pat Romanski

News Feed Item

Avast Reveals Cryptocurrency Confusion as 40% of Consumers Unaware of Cryptomining Malware Risk

At RSA 2018, Avast, the global leader in digital security products, will be performing an experiment that reveals vulnerabilities in IoT and mobile devices through a live demonstration of mining of the cryptocurrency Monero. The experiment will highlight to RSA attendees the risks malicious cryptomining poses when Internet of Things (IoT) devices are hijacked for this purpose. Avast research found two in five people were not aware there are malware and infected websites mining cryptocurrencies. The study, conducted by Avast in March 2018 with over 2,300 computer users in the U.S, also found that 25 percent of those polled did not know what cryptocurrency is.

The experiment at RSA will invite all attendees to take part in a cryptomining challenge using their own personal smartphones to mine Monero, in order to encourage a deeper understanding of the threats posed by malicious cryptomining. The study found that people also held some misconceptions about cryptomining; nearly half of users, 47 percent, say they aren’t afraid of cryptomining malware because they believe that cryptominers can’t spy or steal data (13%), and that not owning cryptocurrency or not being involved in mining themselves makes users immune to cryptomining processes (19%).

“With the growing IoT landscape, PC users are no longer the sole victims of cryptomining malware. Now, IoT devices and smartphones are just as easily hijacked and turned into cryptomining machines — and it doesn’t matter if you own cryptocurrency or not,” said Ondrej Vlcek, CTO, EVP and GM, Consumer, at Avast. “This is the kind of malware that can run quietly in the background of any smart device. Our hope at Avast is to dispel myths and educate users on the very real risks cryptomining presents to personal data and device performance.”

As the cyber threat landscape multiplies alongside the growing ecosystem of IoT devices, cybercriminals behind cryptomining malware maximize profit faster. The first IoT botnet, a variant of the Mirai botnet, appeared in 2017 providing cybercriminals the most profit when attacking devices at a mass scale. Initial research by Avast shows that 12,000 vulnerable IoT devices would be needed to mine $1,000 in Monero coins over the duration of RSA.

For users, identifying malware on IoT devices is difficult. Mining on IoT devices remains largely invisible to the consumer, and can often result in high energy bills, poor device performance, and a shortened device lifespan. In addition to cryptomining, data privacy is a risk largely unaddressed in the IoT landscape. Later this year, Avast will be providing consumers with a new protection and privacy offering, Avast Smart Home Security, which defends against IoT security threats to keep people’s homes secure and their private lives private.

At the Avast booth S. #429, visitors will have the opportunity to participate and witness cryptomining in real-time. The cryptomining challenge will demonstrate the risk of cryptomining malware on a user’s mobile device. Attendees that participate in the mining challenge with their own phone will receive a power bank and entered into a drawing. At random, a winner will be chosen to take home a Samsung Galaxy S9 with the Avast Mobile Security app installed, protecting users from threats including cryptomining malware.

RSA attendees can visit the Avast booth at South Expo #429 to view and participate in the demonstration.

About Avast

Avast (www.avast.com) is the global leader in digital security products. With over 400 million users online, Avast offers products under the Avast and AVG brands that protect people from threats on the internet and the evolving IoT threat landscape. The company’s threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, OPSWAT, ICSA Labs, West Coast Labs and others. Avast is backed by leading global private equity firms CVC Capital Partners and Summit Partners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...