What is cryptojacking? How to prevent, detect, and recover from it

Organization with many cryptojacked systems can incur real costs in terms of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem. There’s a lot of room for growth and evolution,” says Marc Laliberte, threat analyst at ne...

Full description

Saved in:
Bibliographic Details
Published inCSO (Online)
Main Author Nadeau, Michael
Format Trade Publication Article
LanguageEnglish
Published Framingham Foundry 06.05.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Organization with many cryptojacked systems can incur real costs in terms of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem. There’s a lot of room for growth and evolution,” says Marc Laliberte, threat analyst at network security solutions provider WatchGuard Technologies. According to the report, The New Gold Rush Cryptocurrencies Are the New Frontier of Fraud, from Digital Shadows, cryptojacking kits are available on the dark web for as little as $30. Dubbed BadShell it used: * PowerShell to execute commands--a PowerShell script injects the malware code into an existing running process. * Task Scheduler to ensure persistence * Registry to hold the malware's binary code You can find more details on how BadShell works in Comodo's Global Threat Report Q2 2018 Edition.