Since the beginning of 2021, Kaspersky has detected more than 1 500 fraudulent global resources aimed at potential crypto investors or users who are interested in cryptocurrency mining.
During this period, the company also prevented more than 70 000 user attempts globally, to visit such sites.
The most common schemes used by cybercriminals included:
* Creating fake cryptocurrency exchange websites: in this case, the user is allegedly given a coupon for replenishing an account on a crypto exchange. However, to use it they must carry out a verification payment of usually no more than 0.005 bitcoin (about $200), which becomes the cybercriminals’ profit.
* Sending messages about fake sales of video cards and other equipment for mining: to purchase equipment, the user needs to make an advance payment. After providing it, the author of the ads stops communicating.
* Creating phishing pages with various content to steal private keys, which allow cybercriminals to gain access to all digital assets associated with a crypto wallet.
Globally, cryptocurrency mining malware wreaked havoc in 2018, infecting more than 5-million people in the first three quarters of that year.
Kaspersky’s research shows that, in some African countries, the threat of malicious crypto miners, remains prevalent. Currently in South Africa, the share of all users targeted by malicious crypto miners in H1 2021 was 0,6%. In Kenya, the share of all users targeted was 0,85% and in Nigeria it was 0,71%.
“Although these percentages may be interpreted as low and may not seem significant to users, crypto-miner malware has been identified as one of the top 3 malware families rife in South Africa, Kenya and Nigeria at present, which we believe emphasises that as cryptocurrency continues to gain momentum, more users will likely be targeted,” says Bethwel Opil, enterprise sales manager at Kaspersky in Africa.
In certain African countries, the share of all users targeted by malicious crypto miners is much higher: Ethiopia shows a share of 3,68% and Rwanda a share of 3,22%.
When looking at the fraudulent global resources detected by Kaspersky, typically, cybercriminals locate sites in popular domain zones: .com, .net, .org, .info, as well as in zones where domain acquisition is cheap: .site, .xyz, .online, .top, .club, .live.
A distinctive feature of phishing and other types of cryptocurrency fraud is the high level of detail on phishing websites. For example, on fake crypto exchanges, real data, such as bitcoin rates, is often loaded from existing exchanges.
Attackers understand that people who are investing or are interested in this area are often more tech-savvy than the average user. Therefore, the cybercrooks make their techniques more complex in order to get data and money from these people.
“Lately, many have become interested in cryptocurrencies, and attackers would not pass up the opportunity to use this to their advantage,” says Alexey Marchenko, head of the content filtering methods development department at Kaspersky. “At the same time, both those who want to invest or mine cryptocurrency and simply the holders of such funds can find themselves on the fraudsters’ radar.
“For example, one of the schemes we recently discovered went as follows: users received a message about the sale of an exclusive coronavirus vaccine earlier than official schedules and only for those who have bitcoins. This type of fraud was especially prevalent when the vaccines just became available.
“The user went to the site where the contact indicated, to which it was necessary to write to pre-order the vaccine. The target then needed to make an advance payment in bitcoins, with the money going to the cybercriminals’ account and the person receiving nothing in return.”