Kaspersky’s study reveals that companies worry about data breaches and ransomware. However, it also shows that the biggest threat in Southeast Asian small and medium businesses (SMBs) are miners.

Malicious mining, also known as cryptojacking, refers to attacks that can inflict both direct and indirect losses for a business.

Cryptocurrency miners operate in a way that these programs harness target victims’ computing power to enrich cybercriminals. They can overwhelm a system, causing severe performance problems.

The number of malicious mining attempts against SMBs blocked by Kaspersky solutions and the country’s ranking based on the share of users most infected with this malware.

“There are obvious signs when your file is being held by ransomware, but malicious miners take a long while to notice, compounding the true cost of this malware. Cryptocurrency is here to stay, which also means cybercriminals will continue to look for devices they can use illegally for mining,” Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky.

“One important point SMBs should consider is that there is a direct correlation between successful cryptojacking and the use of pirated software. The more freely unlicensed software is distributed, the more miners there are, so I urge companies to use legitimate software at all times,” advised Yeo.

Kaspersky shared the following tips to keep SMBs’ devices safe from malicious miners:

  • Update your operating system and all software regularly.

  • Distrust e-mail attachments by default. Before clicking to open an attachment or follow a link, consider carefully: Is it from someone you know and trust? Is it expected? Is it clean? Hover over links and attachments to see what they’re named or where they go.

  • Don’t install software from unknown sources. It may and often does contain malicious cryptominers.

  • Use a dedicated endpoint security solution equipped with web and application control, anomaly control, and exploit prevention components that monitor and block suspicious activity on the corporate network.

LEAVE A REPLY

Please enter your comment!
Please enter your name here