What Are Cryptomining Attacks?
3 min read
For many, the cryptocurrency phenomenon is intriguing but complicated, involving “blockchain,” “distributed ledgers” and other jargon. Ryan Olson, VP of Threat Intelligence for Unit 42, explains one of the hidden threats of the cryptocurrency boom: cryptomining attacks.
Read the full transcript below.
The other type of cryptomining attacks that we see are malware-based cryptomining, where instead of just taking over your browser, they actually take over your entire computer and use the computer CPU at a much higher level to actually mine coins on your system. And they can do this in a much more persistent way because they don't have to just keep you on a page for a little while, but they can mine day and night, week after week, and actually make a significant amount of money.
Learn more about cryptocurrency threats that could affect your business.
Read the latest Unit 42 report, “How Cryptocurrency Drives Cyber Risk.”
More Threat Articles:
- 3 Challenges to Identifying Evasive Threats
- 3 Ways to Prevent Evasive Threats
- How to Break the Cyber Attack Lifecycle
- What is an Exploit Kit?
- What is a Distributed Denial of Service Attack (DDoS)?
- What is a Denial of Service Attack (DoS)?
- What is a Botnet?
- What is Spyware?
- Cybercrime: The Underground Economy
- What is a Phishing Attack?
- What is a Credential-Based Attack?
- What Are Unknown Cyberthreats?