{"id":31093,"date":"2020-11-02T12:58:57","date_gmt":"2020-11-02T10:58:57","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31093"},"modified":"2025-08-28T01:59:59","modified_gmt":"2025-08-27T22:59:59","slug":"rise-in-bitcoin-price-boosts-the-popularity-of-hidden-miners","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/rise-in-bitcoin-price-boosts-the-popularity-of-hidden-miners\/","title":{"rendered":"Rise in Bitcoin price boosts the popularity of hidden miners"},"content":{"rendered":"<p>In the third quarter of 2020, activity by cryptojacking software rose. This is according to a threat report by ESET.<!--more--><\/p>\n<p>Experts link the renewed popularity of cryptojacking to the rise in Bitcoin price, which in September <a href=\"https:\/\/forklog.com\/en\/news\/bitcoins-monthly-candle-closed-above-13000-for-the-first-time-since-december-2017\">reached<\/a> a two-year high above $13,000.<\/p>\n<p>During this period, one of the active programs aimed at stealing and mining cryptocurrency, <a href=\"https:\/\/forklog.com\/en\/news\/new-cryptominer-kryptocibule-targets-residents-of-eastern-europe\">became<\/a> the malware KryptoCibule. The virus&#8217;s capabilities allow it to launch covert mining on the victim&#8217;s device, substitute cryptocurrency-wallet addresses, and steal personal information.<\/p>\n<p>The number of malicious emails rose by 9% quarter over quarter. Through email campaigns, a WannaCry variant spread, the damage from its activity in 2017 exceeded $1 billion.<\/p>\n<blockquote>\n<p>\u201cDespite the decline in ransomware attacks, more than half of all detected samples in this category of viruses were Win\/Filecoder.WannaCrypto,\u201d according to an ESET report.<\/p>\n<\/blockquote>\n<div id=\"attachment_115070\" style=\"width: 616px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-115070\" class=\"wp-image-115070 size-full\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image003-1.jpg\" alt=\"\u0420\u043e\u0441\u0442 \u0446\u0435\u043d\u044b \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u0430 \u0443\u0432\u0435\u043b\u0438\u0447\u0438\u043b \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c \u0441\u043a\u0440\u044b\u0442\u044b\u0445 \u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432\" width=\"606\" height=\"284\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image003-1.jpg 606w, https:\/\/forklog.com\/wp-content\/uploads\/image003-1-300x141.jpg 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p id=\"caption-attachment-115070\" class=\"wp-caption-text\">Ranking of detected ransomware samples \/ Source: ESET.<\/p>\n<\/div>\n<p>Earlier in Q2 2020, the number of covert browser-based cryptocurrency mining incidents rose 163% from the previous quarter.<\/p>\n<p>By the first half of 2020, among the top threats, ransomware viruses <a href=\"https:\/\/forklog.com\/en\/news\/bitcoin-ransomware-operators-lose-popularity-with-hackers\">disappeared<\/a> \u2014 accounting for only 1% of all hacker attacks.<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the third quarter of 2020, activity by cryptojacking software rose. This is according to a threat report by ESET.<\/p>\n","protected":false},"author":1,"featured_media":31094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1916],"class_list":["post-31093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-eset"],"aioseo_notices":[],"amp_enabled":true,"views":"17","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=31093"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31093\/revisions"}],"predecessor-version":[{"id":31095,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31093\/revisions\/31095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/31094"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=31093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=31093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=31093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}