Solution Briefs

Protect Your Organization From Unwanted Cryptomining: At-a-Glance

Issue link: https://learn-umbrella.cisco.com/i/1081452

Contents of this Issue

Navigation

Page 0 of 1

At a glance Protect Your Organization From Unwanted Cryptomining What is cryptocurrency mining? Cryptocurrency mining is the process of generating new units of cryptocurrency. Cryptominers use their own computing power to verify cryptocurrency transactions and are rewarded with new coins proportional to the amount of computing power they donated to the blockchain network. What is malicious cryptomining? Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency through individual machines in browser JavaScript exploits, cloud AWS instances, etc. Why should you care? Cryptomining was the fastest growing threat of 2018. Bad actors are drawn to cryptomining because it's an easy way for them to generate cash and attack more people while remaining anonymous. Cisco Umbrella researchers are seeing growth in cryptomining across all verticals and organization sizes. Cryptomining in your environment means you are vulnerable. While browser based cryptomining can be concerning if it is happening routinely and profusely, you should always be on the lookout for threat actors installing malicious cryptomining software in your environment. Attackers can leverage their presence in your network to execute future attacks. Malicious cryptomining also represents a hidden cost to your organization. Stolen computing resources impacts system performance, electricity costs, AWS computing costs, and your bottom line. © 2019 Cisco and/or its affiliates. All rights reserved. How does cryptomining work? Malicious cryptomining often takes the form of JavaScript that mines crypto currencies like Monero when visitors frequent those sites to consume content. If coded properly, these JavaScript injections – if coded properly – have little noticeable effect on victim's systems.

Articles in this issue

view archives of Solution Briefs - Protect Your Organization From Unwanted Cryptomining: At-a-Glance