Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Mining Malevolence: Cryptominers in the Cloud Slide 1 Mining Malevolence: Cryptominers in the Cloud Slide 2 Mining Malevolence: Cryptominers in the Cloud Slide 3 Mining Malevolence: Cryptominers in the Cloud Slide 4 Mining Malevolence: Cryptominers in the Cloud Slide 5 Mining Malevolence: Cryptominers in the Cloud Slide 6 Mining Malevolence: Cryptominers in the Cloud Slide 7 Mining Malevolence: Cryptominers in the Cloud Slide 8 Mining Malevolence: Cryptominers in the Cloud Slide 9 Mining Malevolence: Cryptominers in the Cloud Slide 10 Mining Malevolence: Cryptominers in the Cloud Slide 11 Mining Malevolence: Cryptominers in the Cloud Slide 12 Mining Malevolence: Cryptominers in the Cloud Slide 13 Mining Malevolence: Cryptominers in the Cloud Slide 14 Mining Malevolence: Cryptominers in the Cloud Slide 15 Mining Malevolence: Cryptominers in the Cloud Slide 16 Mining Malevolence: Cryptominers in the Cloud Slide 17 Mining Malevolence: Cryptominers in the Cloud Slide 18 Mining Malevolence: Cryptominers in the Cloud Slide 19 Mining Malevolence: Cryptominers in the Cloud Slide 20 Mining Malevolence: Cryptominers in the Cloud Slide 21 Mining Malevolence: Cryptominers in the Cloud Slide 22 Mining Malevolence: Cryptominers in the Cloud Slide 23 Mining Malevolence: Cryptominers in the Cloud Slide 24 Mining Malevolence: Cryptominers in the Cloud Slide 25 Mining Malevolence: Cryptominers in the Cloud Slide 26 Mining Malevolence: Cryptominers in the Cloud Slide 27 Mining Malevolence: Cryptominers in the Cloud Slide 28 Mining Malevolence: Cryptominers in the Cloud Slide 29 Mining Malevolence: Cryptominers in the Cloud Slide 30 Mining Malevolence: Cryptominers in the Cloud Slide 31 Mining Malevolence: Cryptominers in the Cloud Slide 32 Mining Malevolence: Cryptominers in the Cloud Slide 33 Mining Malevolence: Cryptominers in the Cloud Slide 34 Mining Malevolence: Cryptominers in the Cloud Slide 35 Mining Malevolence: Cryptominers in the Cloud Slide 36 Mining Malevolence: Cryptominers in the Cloud Slide 37 Mining Malevolence: Cryptominers in the Cloud Slide 38 Mining Malevolence: Cryptominers in the Cloud Slide 39 Mining Malevolence: Cryptominers in the Cloud Slide 40
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

0 Likes

Share

Download to read offline

Mining Malevolence: Cryptominers in the Cloud

Download to read offline

Speaker: Cheryl Biswas
Cloud. It's the land of opportunity. Enterprises are doing mass migrations from older and legacy systems to harness greater power and efficiency from innovative new tech. Following that money trail are opportunistic attackers, seeking the computing strength and near-invisibility afforded by enterprise cloud environments to mine bitcoin. Cryptominers are everywhere. And yes, Virginia, they are in the Cloud. These nebulous power-rich realms let attackers set up mining rigs to feast on enterprise resources, while flying below the detection of cloud or conventional security resources. The concern here is that once attackers gain access to our networks, they can pivot and move laterally, to find even greater reward in the vast amounts of data available.

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Mining Malevolence: Cryptominers in the Cloud

  1. 1. “ ”
  2. 2. https://www.bleepingcomputer.com/news/security/exposed-docker- apis-abused-by-ddos-cryptojacking-botnet-malware/
  3. 3. https://www.fireeye.com/blog/threat-research/2018/02/cve-2017-10271-used-to-deliver- cryptominers.html

Speaker: Cheryl Biswas Cloud. It's the land of opportunity. Enterprises are doing mass migrations from older and legacy systems to harness greater power and efficiency from innovative new tech. Following that money trail are opportunistic attackers, seeking the computing strength and near-invisibility afforded by enterprise cloud environments to mine bitcoin. Cryptominers are everywhere. And yes, Virginia, they are in the Cloud. These nebulous power-rich realms let attackers set up mining rigs to feast on enterprise resources, while flying below the detection of cloud or conventional security resources. The concern here is that once attackers gain access to our networks, they can pivot and move laterally, to find even greater reward in the vast amounts of data available.

Views

Total views

3,623

On Slideshare

0

From embeds

0

Number of embeds

3,359

Actions

Downloads

7

Shares

0

Comments

0

Likes

0

×