Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation

By Swachchhanda Shrawan Poudel Contents Crypto mining fast facts The current landscape of crypto mining How cyber-miners gain access to your system How to detect crypto mining with Logpoint Endpoint detection and remediation with Logpoint AgentX Remediation and mitigation best practices TL;DR Cryptocurrency mining is a process of using specialized software to solve complex mathematical problems in order to validate transactions on a cryptocurrency network and create new units of the currency. However, it can be resource-intensive, so some malware actors have turned to malware to covertly install cryptocurrency mining software on the computers of victims in a bid to generate profits.

Read full article on LogPoint

 


Date:

Categorie(s):