At a glance
Protect Your Organization
From Unwanted Cryptomining
What is cryptocurrency mining?
Cryptocurrency mining is the process of generating new units of cryptocurrency. Cryptominers
use their own computing power to verify cryptocurrency transactions and are rewarded with new
coins proportional to the amount of computing power they donated to the blockchain network.
What is malicious cryptomining?
Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly
use a business' computing power to mine digital currency through individual machines in browser
JavaScript exploits, cloud AWS instances, etc.
Why should you care?
Cryptomining was the fastest growing threat of 2018. Bad actors are drawn to cryptomining
because it's an easy way for them to generate cash and attack more people while remaining
anonymous. Cisco Umbrella researchers are seeing growth in cryptomining across all verticals
and organization sizes.
Cryptomining in your environment means you are vulnerable. While browser based cryptomining
can be concerning if it is happening routinely and profusely, you should always be on the lookout
for threat actors installing malicious cryptomining software in your environment. Attackers can
leverage their presence in your network to execute future attacks. Malicious cryptomining also
represents a hidden cost to your organization. Stolen computing resources impacts system
performance, electricity costs, AWS computing costs, and your bottom line.
© 2019 Cisco and/or its affiliates. All rights reserved.
How does
cryptomining work?
Malicious cryptomining often takes the
form of JavaScript that mines crypto
currencies like Monero when visitors
frequent those sites to consume content.
If coded properly, these JavaScript
injections – if coded properly – have little
noticeable effect on victim's systems.