Crypto Trojan

Crypto Trojan

The Virus Trend 2022

During the pandemic, cyberattacks doubled every year. No expert had expected such an explosive increase. Even in the run-up to the Russia-Ukraine conflict, hacking attacks on a wide variety of Ukrainian ministries and institutions were on the rise. With the start of the war, the number of cyber attacks, also in Germany, increased once again. And one cannot get rid of the feeling that the black hats, i.e. malicious hackers, are becoming more and more inventive in order to prey on data, be it that new viruses are being developed or new strategies in social engineering are emerging. But fortunately, the opposite side as the cyber security does not sleep either and tries to keep up.

What is a crypto Trojan?

In last week's blog, we described one of the latest virus trends, that of the Crypto Trojan. This virus targets something else besides a user's data and that is the graphics card. But why the graphics card? Because crypto-currency is mined from it and is thus the main target of the Trojan. The Trojan then joins several endpoints together and forces them to mine a Bitcoin. This happening does not go unnoticed by the user. Suddenly, the fans start up and the CPU is running at full speed, even though the user is only working on a Word document, for example, and has an email program and browser open. Such an association is called a bot network.

How to get infected

Even if it sounds unbelievable, but you can get infected with malware anywhere in the digital world. It starts by visiting sites that you should not visit, but it can also happen when you accidentally click on an attachment on the website of a major daily newspaper and download something. There are other ways to get infected through the browser, such as cookie poisoning. However, there is another way to get infected, through the emails. There are also several ways, even if a sender looks trustworthy, it can be spoofed. This means: instead of or, the e-mail address is then However, when spoofing, the spelling must also be observed, so the e-mail address can also be called Although most mail programs are very good at detecting spam or junk mail, some mails slip through. Therefore, one should always look at the most important indicators: Who is the sender, is the sender spelled correctly. How is the address, general or personal? What is in the mail, how is the spelling, what is in the signature. How is the attachment named. Of course, some mails also end up, by mistake, in junk folders, there you should check even more carefully. Also look for the company or the sender on the Internet.

How to protect yourself from malware infections.

A truly and tested protection is offered by HP Enterprise Sure Click. Through this, files are executed in secured Virtual Machines, should a virus be executed through this, one can simply close the machine and thereby dissolve it and the virus can thus not access the system. The file is thus sandboxed. HP Enterprise Sure Click can boast the following figure in particular: 5,000,000,000. That's how many files have been opened and executed with the program without even causing any damage to the users.

But now you do not have to be paranoid, but especially if you are with the work devices on the road in the digital world. Because the data of a company, are the most valuable asset of a company and must be protected with all means. We are happy to help you with this!

Do you have questions about HP Sure Click Enterprise, would you like to have your employees trained in the handling of data or would you like to receive detailed and professional advice? Then contact us today, we will be happy to assist you.

Contact us now