Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on its own blockchain, which hides virtually all transaction details. The identity of the sender and recipient, as well as the transaction amount itself, are hidden. Because of these anonymity features, Monero allows cybercriminals greater freedom and privacy from the public blockchain that bitcoin uses. Monero has become widely used in many Ransomware-As-A-Service (RAAS) tools purchased on the Dark Web. REvil, for example, has been giving discounts to its ransomware victims if they complete their ransom payment in Monero.
Cybercriminals had a wake-up call after the FBI successfully breached a cryptocurrency wallet held by the Colonial Pipeline hackers by following the money trail on bitcoin’s public blockchain wallet addresses. The FBI bitcoin recovery proved to hackers that Bitcoin is ‘traceable’. Hackers have already started updating their tools to use a privacy-enhanced cryptocurrency called Monero Coin. With Monero coin hackers have a greater degree of privacy-protecting them from a similar fate to the FBI Bitcoin recovery.
Before you invest in Monero Coin, you should consider the potential for regulators of cryptocurrency exchanges to shut down the use of Monero coin. Given the extreme privacy of this cryptocurrency, there will be great pressures to shut down or prevent the conversion of Monero Coin into hard currencies like US dollars, goods, or services.
It’s a relief the FBI has the ability to recover funds in some cases, but you shouldn’t expect to get your money back as Colonial did. With that said, there are certain things you should be doing in light of these events:
There’s really no change in the recommendations for business owners based upon this event. You still do not want to be hit with ransomware regardless of whether it uses Bitcoin or Monero coin. It’s still a bad event that disrupts your business. Take CyberHoot’s recommendations below to protect your business as always.
In addition to these cryptocurrency-specific actions, your company needs to take proactive measures to first reduce its chances of being hit by ransomware. CyberHoot recommends the following best practices to avoid, prepare for, and prevent damage from these attacks:
Start building your robust, defense-in-depth cybersecurity plan at CyberHoot.
Sources:
Additional Reading:
Monero – The New Crypto For Hackers
Related Terms:
CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like:
Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreA newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.