Successfully reported this slideshow.
Your SlideShare is downloading. ×

Mining Malevolence: Cryptominers in the Cloud

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
Phishing in the cloud era
Phishing in the cloud era
Loading in …3
×

Check these out next

1 of 40 Ad

Mining Malevolence: Cryptominers in the Cloud

Download to read offline

Speaker: Cheryl Biswas
Cloud. It's the land of opportunity. Enterprises are doing mass migrations from older and legacy systems to harness greater power and efficiency from innovative new tech. Following that money trail are opportunistic attackers, seeking the computing strength and near-invisibility afforded by enterprise cloud environments to mine bitcoin. Cryptominers are everywhere. And yes, Virginia, they are in the Cloud. These nebulous power-rich realms let attackers set up mining rigs to feast on enterprise resources, while flying below the detection of cloud or conventional security resources. The concern here is that once attackers gain access to our networks, they can pivot and move laterally, to find even greater reward in the vast amounts of data available.

Speaker: Cheryl Biswas
Cloud. It's the land of opportunity. Enterprises are doing mass migrations from older and legacy systems to harness greater power and efficiency from innovative new tech. Following that money trail are opportunistic attackers, seeking the computing strength and near-invisibility afforded by enterprise cloud environments to mine bitcoin. Cryptominers are everywhere. And yes, Virginia, they are in the Cloud. These nebulous power-rich realms let attackers set up mining rigs to feast on enterprise resources, while flying below the detection of cloud or conventional security resources. The concern here is that once attackers gain access to our networks, they can pivot and move laterally, to find even greater reward in the vast amounts of data available.

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Recently uploaded (20)

Advertisement

Mining Malevolence: Cryptominers in the Cloud

  1. 1. “ ”
  2. 2. https://www.bleepingcomputer.com/news/security/exposed-docker- apis-abused-by-ddos-cryptojacking-botnet-malware/
  3. 3. https://www.fireeye.com/blog/threat-research/2018/02/cve-2017-10271-used-to-deliver- cryptominers.html

×