In 2015 and 2016 the winner was crypto-ransomware exploits. In 2017 and 2018 the most common exploit was Business Email Compromise, aka Email Account Hijacking (BEC/EAC). This is year is shaping up to be the year of the crypto-mining exploit.
Here are the crypto-mining malware programs that are the most prevalent:
- AuthedMine – A variant of Coinhive, AuthedMine ios supposed to require an explicit opt-in from the end user to run the miner. This is designed to run on browsers with ad-blockers ...
MAR