TOGETHER, WE

RESPOND

FASTER

CYBERSEC 2019

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

In Just One Month, Acronis’ New Cryptojacking Blocker Delivers Great Results

One month after the release of the Acronis True Image 2019 Cyber Protection update, we’ve already gotten some interesting findings and amazing results to share from our update to our Acronis Active Protection defensive technologies. One of the major features added as part of the Cyber Protection update was the ability to detect and stop potential cryptomining malware in Windows systems, safeguarding the machines resources, performance and potential hardware of Acronis True Image users.

Our detection of possible cryptojacking attacks works exactly the same way as our anti-ransomware solution: Acronis Active Protection detects a threat, notifies the user, and offers a choice to either block or whitelist the process.

While we did not expect to see a lot of detections during the initial rollout, the telemetry data collected so far – surprisingly – shows the opposite.
More Detections Than Expected

The first month resulted in tens of thousands of detections from all over the world. Among the well-known standard miners detected were xmr-stak-cpu.exe, Claymore CryptoNote CPU Miner, rhminer, and xmrig Monero miner. Along with those legitimate strains, several new malware samples and legitimate processes were detected as well.

Typically when anti-virus solutions detect cryptominers, it is hard to tell if the process was intentional mining or illicit because the AV solutions automatically respond to each incident. With Acronis Active Protection, the user has to act to each detection, so we can tell if an incident was an attack or an approved process. Armed with this telemetry data, we found that more than 60 percent of the mining detected in the first month was illicit – having been stopped by a user who did not whitelist it later.

That examination clearly shows that a lot of today’s malicious miners are injected into legitimate signed processes, using them as a mining host to avoid detection. What is most alarming is that this approach is actually working – these miners are not being detected by a lot of anti-malware solutions out there.

We will continue to research the topic but for users out there we recommend to check their AV solution if it able to detect such a threat. To be on a safe side, install Acronis True Image 2019 Cyber Protection as an additional layer of protection. Not only will it take care of your data’s safety, but it will also help preserve your system resources and hardware in the long run.
 

  • Share:

CYBERSEC 2019 Partners

Endorsed by

行政院資通安全處
經濟部

Organizer

iThome

Co-Organizer

社團法人台灣駭客協會

Premiere Technology Partner

台灣思科系統股份有限公司

Strategic Technology Partner

奧義智慧科技股份有限公司

Diamond Sponsor

中華電信股份有限公司
CHT Security 中華資安國際
精品科技股份有限公司

Platinum Sponsor

台灣國際商業機器股份有限公司
漢領國際有限公司
台灣微軟
Splunk

Gold Sponsor

惠普科技
商丞科技股份有限公司

Exhibitor

Consulting Partner

勤業眾信聯合會計師事務所

Supporting Association

中華民國電腦稽核協會
亥客書院
財團法人資訊工業策進會
財團法人國家實驗研究院國家高速網路與計算中心
財團法人中華民國國家資訊基本建設產業發展協進會
美商國際半導體產業有限公司台灣分公司
Students’ Information Technology Conference
臺灣學術網路危機處理中心
台灣資通產業標準協會
台中市電腦商業同業公會
財團法人電信技術中心
台灣電腦網路危機處理暨協調中心
台灣數位安全聯盟
臺灣電腦安全事件應變中心
國立成功大學資通安全研究與教學中心

Media Partner

Equipment Sponsor

台灣三星電子股份有限公司
維嘉全球科技股份有限公司

Cyber Taiwan Pavilion

Endorsed by

經濟部

Organizer

工業局
iThome

Co-Organizer

工研院

Supporting Association

資策會

Cyber Taiwan Pavilion Exhibitor

社團法人台灣駭客協會
中華資安國際
奧義智慧科技股份有限公司
精品科技
詮睿科技股份有限公司