Cryptominers were the most common malware threat in 2021

An abstract image of digital security.
(Image credit: Shutterstock) (Image credit: Shutterstock)

Stealing sensitive company data might make headlines, but many cybercriminals still prefer installing cryptominers on compromised endpoints for quick, easy, and relatively harmless profit, new research has suggested.

A report from Atlas VPN and Trend Micro found cryptominers were the top malware family in 2021, with exactly 150,909 detections over the course of the year.

“Mining” cryptocurrencies such as bitcoin, or ether, requires heavy computational power, an active internet connection, and plenty of electricity. Crooks have learned of ways to install cryptocurrency miners on compromised devices, and have all the proceedings sent to their private wallet address.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Targeting businesses

Besides raking up the electricity bill for the victim, a cryptominer will often render the device unusable. 

Threat actors most often targeted information and communication businesses with malware, discovering 561,753 malware files in emails sent to employees in the industry. Retail was second, with 397,072 weaponized emails sent, followed by the construction industry, with 356,952.

At the bottom of this list were the finance and manufacturing industries, receiving “just” 198,408, and 188,373 malware files, respectively.

Despite the relative popularity of cryptominers, they’re far from being the only virus being distributed around. Web shell scripts, which allow attackers to access sensitive content, or set up a ransomware attack, were detected 149,290 times. 

The Ulise malware accounted for 145,321 detections in 2021, followed by WannaCry with 97,585 detections. 

“Malware attacks enable attackers to profit off businesses simply and efficiently. Companies that become victims of cyberattacks often become vulnerable to data theft, hijacking, and other similar cyberattacks in the future,” commented cybersecurity writer at Atlas VPN, Vilius Kardelis.

“By employing good cybersecurity practices and applications, businesses can mitigate malware attack risks.”

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
ransomware avast
Ransomware, deepfakes, and scams: the digital landscape in 2024
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
Fraud
Hackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over