×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Behind the Hidden Conversion of Electricity to Money: An In-Depth Analysis of XMR Cryptominer Malware

December 17, 2019

Today’s threat landscape is shifting from cyber crime monetization tactics, such as ransomware and credit card theft, to a new breed of malware: cryptominers. Cryptominers take over a computer’s resources and use them for illicit cryptocurrency mining.

The use of malicious cryptominers has surged as cyber criminals rush to exploit a new cryptocurrency, based on the concepts behind Bitcoin, called “Monero.” Several successful multi-million dollar heists tied to this open source, peer-to-peer cryptocurrency were reported in the first few months of 2018 alone.

This research report provides an in-depth look at current cryptominer trends and the technology behind Monero. It explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

Previous Whitepaper
Addressing Australia’s Security of Critical Infrastructure Act with CyberArk Privileged Access Manager
Addressing Australia’s Security of Critical Infrastructure Act with CyberArk Privileged Access Manager

A growing number of cyber attacks have affected Australia’s critical infrastructure. Learn how the CyberArk...

Next Whitepaper
Addressing the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines with CyberArk Solutions
Addressing the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines with CyberArk Solutions

Financial institutions should follow the Monetary Authority of Singapore’s Technology Risk Management guide...