Most Attacks on Cybersecurity Firm’s Decoy Servers Aimed at Mining Crypto: Report

Of the 16,371 attacks on Aqua Security's decoy servers over the last year, 95% were aimed at mining cryptocurrency through deploying malicious programs.

AccessTimeIconSep 14, 2020 at 4:00 p.m. UTC
Updated Aug 19, 2021 at 4:19 a.m. UTC

Presented By Icon

Election 2024 coverage presented by

Stand with crypto

An analysis of a year's worth of cyberattacks on "honeypot" servers set up by the cybersecurity firm Aqua Security, shows a majority of the attacks targeted earning revenue through mining crypto on compromised servers. 

These particular cloud servers were deliberately misconfigured to attract cyberattacks in an attempt to learn how such attacks take place and how to stop them. The study covers the period between June 2019 and July 2020.

  • Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
    13:18
    Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
  • Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
    05:10
    Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
  • The first video of the year 2024
    04:07
    The first video of the year 2024
  • The last regression video of the year 3.67.0
    40:07
    The last regression video of the year 3.67.0
    • According to Aqua's recent report, of the 16,371 attacks on its decoy servers over the last year, 95% were aimed at mining cryptocurrency through deploying malicious programs to hijack the cloud computing power. 
    • The attacks on the firm's misconfigured servers also registered a sharp rise at the beginning of this year, with attacks per day rising from about 12 in December 2019 to 43 per day in June 2020.
    • While honeypot servers can help understand the methods used by attackers, the report by Alpha Security admits the results might be "profoundly biased towards a single initial access point," indicating that similar studies analyzing multiple compromised access points or a supply-chain attack may reach different conclusions. 
    • Although honeypot serves cannot accurately simulate real-world conditions, they can offer insight into the malicious programs used to compromise cloud servers and the motivations driving such attacks. 
    • Aqua Security's study also found the attacks aimed at mining crypto on its decoy servers appeared to prefer mining monero (XMR) over other cryptocurrencies such as bitcoin. “We speculate that they choose monero since it is considered significantly more anonymous than bitcoin,” the report noted. 
    • A July report by Microsoft found that while rising volatility and mining difficulties have deterred crypto-mining attacks overall, users in countries such as Singapore, Vietnam and India face a relatively higher risk of being exposed to an attack. 

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information have been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. CoinDesk has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. CoinDesk is part of the Bullish group, which owns and invests in digital asset businesses and digital assets. CoinDesk employees, including journalists, may receive Bullish group equity-based compensation. Bullish was incubated by technology investor Block.one.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.