{"id":31411,"date":"2019-03-14T03:47:52","date_gmt":"2019-03-14T07:47:52","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31411"},"modified":"2019-03-14T03:47:52","modified_gmt":"2019-03-14T07:47:52","slug":"ransomware-is-so-2017-modern-cybercriminals-are-all-about-cryptojacking","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/14\/ransomware-is-so-2017-modern-cybercriminals-are-all-about-cryptojacking\/","title":{"rendered":"Ransomware Is So 2017: Modern Cybercriminals Are All About Cryptojacking"},"content":{"rendered":"\n<p style=\"text-align:left\">Is someone at IBM a big comic book fan? The name \u201cX-Force\u201d is popularly associated with a&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/X-Force\">superhero team<\/a>&nbsp;from Marvel Comics, but IBM has chosen it as a moniker for many of the company\u2019s digital security offerings, such as its penetration testing service,&nbsp;<a href=\"https:\/\/www.ibm.com\/security\/services\/offensive-security-services\">X-Force Red<\/a>, or its&nbsp;<a href=\"https:\/\/securityintelligence.com\/ibm-x-force-iris-bringing-a-new-approach-to-incident-response\/\">X-Force IRIS<\/a>&nbsp;incident response team. Mysterious branding decisions aside, last week IBM released the&nbsp;<a href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\">2019 X-Force Threat Intelligence Index<\/a>, a summary of the changing trends in cyberattacks, derived from analyzing trillions of individual security events from around the world.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/03\/cyber-security-1805246__340.png\" alt=\"\" class=\"wp-image-31412\" width=\"222\" height=\"139\"\/><\/figure><\/div>\n\n\n\n<p style=\"text-align:left\">These events range from a simple probing\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Port_scanner\">port scan<\/a>\u00a0to sophisticated malware attacks. Together, they show a changing trend in attackers\u2019 methods over the course of 2018, driven by their desire to get the most bang for their buck\u2014literally. Even though intrusions\u00a0by\u00a0<a href=\"https:\/\/www.dni.gov\/files\/documents\/ICA_2017_01.pdf\">state actors<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.cnbc.com\/2018\/08\/24\/turkish-hacktivists-make-cyberattacks-on-us-journalists.html\">hacktivists<\/a>\u00a0get a lot of attention, most attacks are carried out by criminals simply looking to make money as easily as possible.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/security\/ransomware-is-so-2017-modern-cybercriminals-are-all-about-cryptojacking&amp;ct=ga&amp;cd=CAEYASoUMTU1NTA2MDEzNTY1NzA5MDU2MTIyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNGhHa5NrkrPGEma_XRpJQ7v8dWWww\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Read more: (opens in a new tab)\">Read more:<\/a> <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is someone at IBM a big comic book fan? The name \u201cX-Force\u201d is popularly associated with a&nbsp;superhero team&nbsp;from Marvel Comics, but IBM has chosen it as a moniker for many of the company\u2019s digital security offerings, such as its penetration <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/14\/ransomware-is-so-2017-modern-cybercriminals-are-all-about-cryptojacking\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[663,636],"tags":[637],"class_list":["post-31411","post","type-post","status-publish","format-standard","hentry","category-cryptojacking","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31411"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31411\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}