13.07.2019 Views

SUMMER 2019

Distributor's Link Magazine Summer 2019 / Vol 42 No3

Distributor's Link Magazine Summer 2019 / Vol 42 No3

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

126<br />

THE DISTRIBUTOR’S LINK<br />

JOE DYSART HACKERS’ NEW TRICK: STEALING COMPUTING PROCESSING POWER FROM FASTENER DISTRIBUTORS from page 12<br />

Other hackers are especially crafty in camouflaging<br />

mining programs as legitimate software. Kapersky Labs,<br />

for example, has uncovered a mining program that<br />

looks like an Adobe product installed on your computing<br />

device -- complete with a fake Adobe icon, a fake Adobe<br />

executable file and a fake Adobe digital signature,<br />

according to Evgeny Lopatin, a security expert at the IT<br />

security firm.<br />

“Malware, especially cryptominers, continually evolves<br />

to avoid detection, often hiding in memory or delivering<br />

malicious code directly into the memory of a system,”<br />

adds Jim Gordon, general manager, Intel Security.<br />

The impact on individuals and fastener distributorships<br />

can be significant. Computer power theft generally<br />

results in a slowdown in computing performance while<br />

the theft is underway, making it more difficult to work on<br />

your device and decreasing<br />

your overall productivity.<br />

Computers can also<br />

become unstable during a<br />

theft. Plus, hackers hijacking<br />

computers for mining often<br />

have no qualms driving<br />

your computer processors<br />

and supporting systems at<br />

maximum speed. That often<br />

results in shortening the life<br />

of the devices or overheating<br />

batteries.<br />

This is why computers hijacked by Black Hat miners<br />

often have their fans running at maximum speed -- the<br />

fans are trying to cool down computer processors<br />

running hot at maximum speed.<br />

In addition, the results of the thievery show-up in<br />

inflated electricity bills. Plus, added costs also show up<br />

for fastener distributors using cloud connections that are<br />

compromised by the thieves – bills for cloud CPU usage<br />

can be much higher.<br />

“The massive profit incentive puts people, devices<br />

and organizations at risk,” says Mike Fey, president and<br />

COO, Symantec.<br />

Unfortunately, the problem of computer processing<br />

theft will most likely be with us as long as cryptocurrencies<br />

like Bitcoin, Ethereum and Monero remain<br />

popular, Haley adds.<br />

That’s especially true when the value of cryptocurrencies<br />

soar. While the early value of a Bitcoin<br />

was at times less than a penny in 2010, the price of<br />

a single Bitcoin soared in value to $20,000 by 2018<br />

(www.coindesk.com/price/bitcoin). That value has since<br />

dropped to approximately $5,000. But even at that rate,<br />

the coins are still apparently worth thieving for.<br />

Hackers discovered the market in Black Hat mining<br />

as crypto-currencies burgeoned and grew to rely on<br />

thousands of computers across the world to maintain<br />

their systems.<br />

CRYPTO-JACKING CAN SERIOUSLY IMPAIR<br />

WORKER PRODUCTIVITY.<br />

Essentially, the currency systems need those<br />

networks to verify all the transactions associated with<br />

digital coin transactions and to perform overall auditing<br />

of their systems.<br />

Scores of legitimate<br />

computer networks – or<br />

White Hat miners -- regularly<br />

perform this work and are<br />

paid in new, digital crypto<br />

currency ‘coins’ after they<br />

complete and pre-agreed<br />

amount of auditing. That’s<br />

why the computer network<br />

operators are called ‘miners:’<br />

Their work as auditors for<br />

the currency systems enable<br />

them to ‘mine’ newly created crypto currency coin as<br />

payment for their work.<br />

Black Hat miners do the same work as their legitimate<br />

counterparts -- but with one major difference: Instead<br />

of using their own computer networks, they unleash<br />

malware onto the Web that transforms thousands of<br />

computers, smartphones and other computer devices<br />

into a mining zombie network.<br />

Together, that stolen processing power is used to<br />

mine crypto-currency.<br />

Currently, IT security experts say fastener distributors<br />

should be on the lookout for two types of Black Hat<br />

crypto-mining. The first comes in the same format as our<br />

old friend, malware.<br />

CONTINUED ON PAGE 184

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!