28% of Aussie orgs impacted by cryptojacking in Q1


By Dylan Bushell-Embling
Thursday, 21 June, 2018


28% of Aussie orgs impacted by cryptojacking in Q1

More than one in four (28%) Australian and New Zealand organisations were impacted by cryptojacking in the first quarter of 2018, up from 13% in the prior quarter, according to Fortinet’s latest Quarterly Threat Landscape Report.

The report found that cybercriminals are creating stealthy fileless malware to inject infected code into browsers.

Miners are targeting multiple operating systems and cryptocurrencies, including Bitcoin, Dash and Monero, and are fine-tuning delivery and propagation techniques from other threat vectors.

Meanwhile, 21% of organisations reported encountering mobile malware, up 7% from the prior quarter, as attackers continue to target IoT devices.

Attackers have also been combining destructive malware with designer attacks on high-profile events such as the Commonwealth Games and Olympics.

For these type of targeted attacks, criminals conduct significant reconnaissance on an organisation before launching an attack. Examples include the Olympic Destroyer malware and the more recent SamSam ransomware.

Ransomware indeed continued to evolve in the first quarter, with the emergence of new delivery channels such as social engineering, and new techniques including multistage attacks to evade detection and infect systems.

“We face a troubling convergence of trends across the cybersecurity landscape. Malicious cyber actors are demonstrating their efficiency and agility by exploiting the expanding digital attack surface, taking advantage of newly announced zero-day threats, and maximising the accessibility of malware for bad intent,” Fortinet Regional Director for ANZ Jon McGettigan said.

“In addition, IT and OT teams often don’t have the resources necessary to keep systems appropriately hardened or protected. However, implementing a security fabric which prioritises speed, integration, advanced analytics and risk-based decision-making can enable comprehensive protection at machine speed and scale.”

Please follow us and share on Twitter and Facebook. You can also subscribe for FREE to our weekly newsletter and quarterly magazine.

Related Articles

How the explosion of non-human identities is changing cybersecurity

A surge in machine‍-‍to‍-‍machine communication and non‍-‍human...

Building stronger critical infrastructure with Zero Trust

Zero Trust provides a way to stay ahead of cyber attacks by assuming breaches will happen and...

Happy birthday, Active Directory!

Active Directory is a technology that has proved its staying power and has shaped enterprise IT...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd