×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Behind the Hidden Conversion of Electricity to Money: An In-Depth Analysis of XMR Cryptominer Malware

December 17, 2019

Today’s threat landscape is shifting from cyber crime monetization tactics, such as ransomware and credit card theft, to a new breed of malware: cryptominers. Cryptominers take over a computer’s resources and use them for illicit cryptocurrency mining.

The use of malicious cryptominers has surged as cyber criminals rush to exploit a new cryptocurrency, based on the concepts behind Bitcoin, called “Monero.” Several successful multi-million dollar heists tied to this open source, peer-to-peer cryptocurrency were reported in the first few months of 2018 alone.

This research report provides an in-depth look at current cryptominer trends and the technology behind Monero. It explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

Previous Flipbook
Addressing the Security of Australia’s Critical Infrastructure with CyberArk Privileged Access Security
Addressing the Security of Australia’s Critical Infrastructure with CyberArk Privileged Access Security

As of July 11th, 2018, privileged access to critical infrastructure in Australia must be closely secured an...

Next Flipbook
Addressing the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines with CyberArk Solutions
Addressing the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines with CyberArk Solutions

Learn how CyberArk Privileged Access Security solutions can help your company comply with the Monetary Auth...