What is cryptojacking? How to prevent, detect, and recover from it
Organization with many cryptojacked systems can incur real costs in terms of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem. There’s a lot of room for growth and evolution,” says Marc Laliberte, threat analyst at ne...
Saved in:
Published in | CSO (Online) |
---|---|
Main Author | |
Format | Trade Publication Article |
Language | English |
Published |
Framingham
Foundry
06.05.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Organization with many cryptojacked systems can incur real costs in terms of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem. There’s a lot of room for growth and evolution,” says Marc Laliberte, threat analyst at network security solutions provider WatchGuard Technologies. According to the report, The New Gold Rush Cryptocurrencies Are the New Frontier of Fraud, from Digital Shadows, cryptojacking kits are available on the dark web for as little as $30. Dubbed BadShell it used: * PowerShell to execute commands--a PowerShell script injects the malware code into an existing running process. * Task Scheduler to ensure persistence * Registry to hold the malware's binary code You can find more details on how BadShell works in Comodo's Global Threat Report Q2 2018 Edition. |
---|