• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Why Cryptojacking is So Hot Right Now and How to Avoid Getting Burned

February 9, 2018 By The Editor

“Cryptomining is in its infancy. There’s a lot of room for growth and evolution,” according to Marc Laliberte, threat analyst at WatchGuard Technologies, and the practice of cryptojacking is already rampant – continuing to increase in popularity as the cyber weapon of choice for malicious practitioners due to its low risk and high ROI.

For the unfamiliar – cryptojacking is a tactic hackers are using to mine cryptocurrency through the unauthorized use of an unsuspecting target’s computer. They often do this by duping victims into clicking a malicious link – typically via an email phishing scam – which then injects the cryptomining code into the user’s machine. Another common strategy utilized by cryptojackers is to infect a website or online ad with JavaScript code that will execute automatically once it’s loaded in the victim’s browser.

Cryptojacking code is easy to contract and tricky to detect by design, meaning this particular breed of cyberattack – which is rapidly growing in popularity among the crypto-driven cybercriminals out there – presents its own distinct set of challenges for individuals and businesses working on the web. This week, WatchGuard’s Information Security Threat Analyst, Marc Laliberte, sat down with CSO Online Senior Editor, Michael Nadeau, to discuss the ins and outs of cryptojacking and offer practical advice for preventing, detecting, and remediating these attacks. The following are a few small samples of some of the actionable advice from the interview:

How to prevent cryptojacking
Incorporate the cryptojacking threat into your security awareness training, focusing on phishing-type attempts to load scripts onto users’ computers.“Training will help protect you when technical solutions might fail,” says Laliberte. He believes phishing will continue to be the primary method to deliver malware of all types.

How to detect cryptojacking
Like ransomware, cryptojacking can affect your organization despite your best efforts to stop it. Detecting it can be difficult, especially if only a few systems are compromised. Don’t count on your existing endpoint protection tools to stop cryptojacking. “Cryptomining code can hide from signature-based detection tools,” says Laliberte. “Desktop antivirus tools won’t see them.”

How to respond to a cryptojacking attack
Update and purge browser extensions. “If an extension infected the browser, closing the tab won’t help,” says Laliberte. “Update all the extensions and remove those not needed or that are infected.”

To learn more about cryptojacking and additional methods of preventing, detecting and responding to this prolific malicious practice, check out the full story on CSO Online. Then, find out what other threats cryptocurrency could face in 2018 by reading this Secplicity post.

Share This:

Related

Filed Under: Editorial Articles, Featured

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • 3CX Supply Chain Attack
  • Here Come The Regulations

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use