Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Mining Malevolence: Cryptominers in the Cloud


Published on

Speaker: Cheryl Biswas
Cloud. It's the land of opportunity. Enterprises are doing mass migrations from older and legacy systems to harness greater power and efficiency from innovative new tech. Following that money trail are opportunistic attackers, seeking the computing strength and near-invisibility afforded by enterprise cloud environments to mine bitcoin. Cryptominers are everywhere. And yes, Virginia, they are in the Cloud. These nebulous power-rich realms let attackers set up mining rigs to feast on enterprise resources, while flying below the detection of cloud or conventional security resources. The concern here is that once attackers gain access to our networks, they can pivot and move laterally, to find even greater reward in the vast amounts of data available.

Published in: Engineering
  • Login to see the comments

  • Be the first to like this

Mining Malevolence: Cryptominers in the Cloud

  1. 1. “ ”
  2. 2. apis-abused-by-ddos-cryptojacking-botnet-malware/
  3. 3. cryptominers.html