SUMMER 2019
Distributor's Link Magazine Summer 2019 / Vol 42 No3
Distributor's Link Magazine Summer 2019 / Vol 42 No3
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
126<br />
THE DISTRIBUTOR’S LINK<br />
JOE DYSART HACKERS’ NEW TRICK: STEALING COMPUTING PROCESSING POWER FROM FASTENER DISTRIBUTORS from page 12<br />
Other hackers are especially crafty in camouflaging<br />
mining programs as legitimate software. Kapersky Labs,<br />
for example, has uncovered a mining program that<br />
looks like an Adobe product installed on your computing<br />
device -- complete with a fake Adobe icon, a fake Adobe<br />
executable file and a fake Adobe digital signature,<br />
according to Evgeny Lopatin, a security expert at the IT<br />
security firm.<br />
“Malware, especially cryptominers, continually evolves<br />
to avoid detection, often hiding in memory or delivering<br />
malicious code directly into the memory of a system,”<br />
adds Jim Gordon, general manager, Intel Security.<br />
The impact on individuals and fastener distributorships<br />
can be significant. Computer power theft generally<br />
results in a slowdown in computing performance while<br />
the theft is underway, making it more difficult to work on<br />
your device and decreasing<br />
your overall productivity.<br />
Computers can also<br />
become unstable during a<br />
theft. Plus, hackers hijacking<br />
computers for mining often<br />
have no qualms driving<br />
your computer processors<br />
and supporting systems at<br />
maximum speed. That often<br />
results in shortening the life<br />
of the devices or overheating<br />
batteries.<br />
This is why computers hijacked by Black Hat miners<br />
often have their fans running at maximum speed -- the<br />
fans are trying to cool down computer processors<br />
running hot at maximum speed.<br />
In addition, the results of the thievery show-up in<br />
inflated electricity bills. Plus, added costs also show up<br />
for fastener distributors using cloud connections that are<br />
compromised by the thieves – bills for cloud CPU usage<br />
can be much higher.<br />
“The massive profit incentive puts people, devices<br />
and organizations at risk,” says Mike Fey, president and<br />
COO, Symantec.<br />
Unfortunately, the problem of computer processing<br />
theft will most likely be with us as long as cryptocurrencies<br />
like Bitcoin, Ethereum and Monero remain<br />
popular, Haley adds.<br />
That’s especially true when the value of cryptocurrencies<br />
soar. While the early value of a Bitcoin<br />
was at times less than a penny in 2010, the price of<br />
a single Bitcoin soared in value to $20,000 by 2018<br />
(www.coindesk.com/price/bitcoin). That value has since<br />
dropped to approximately $5,000. But even at that rate,<br />
the coins are still apparently worth thieving for.<br />
Hackers discovered the market in Black Hat mining<br />
as crypto-currencies burgeoned and grew to rely on<br />
thousands of computers across the world to maintain<br />
their systems.<br />
CRYPTO-JACKING CAN SERIOUSLY IMPAIR<br />
WORKER PRODUCTIVITY.<br />
Essentially, the currency systems need those<br />
networks to verify all the transactions associated with<br />
digital coin transactions and to perform overall auditing<br />
of their systems.<br />
Scores of legitimate<br />
computer networks – or<br />
White Hat miners -- regularly<br />
perform this work and are<br />
paid in new, digital crypto<br />
currency ‘coins’ after they<br />
complete and pre-agreed<br />
amount of auditing. That’s<br />
why the computer network<br />
operators are called ‘miners:’<br />
Their work as auditors for<br />
the currency systems enable<br />
them to ‘mine’ newly created crypto currency coin as<br />
payment for their work.<br />
Black Hat miners do the same work as their legitimate<br />
counterparts -- but with one major difference: Instead<br />
of using their own computer networks, they unleash<br />
malware onto the Web that transforms thousands of<br />
computers, smartphones and other computer devices<br />
into a mining zombie network.<br />
Together, that stolen processing power is used to<br />
mine crypto-currency.<br />
Currently, IT security experts say fastener distributors<br />
should be on the lookout for two types of Black Hat<br />
crypto-mining. The first comes in the same format as our<br />
old friend, malware.<br />
CONTINUED ON PAGE 184