35 min

Cryptojacking, and Farewell for Now‪!‬ Security Unlocked

    • Technology

The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created the world of cryptojacking, a form of cybercrime that remains completely hidden from the target and can infect millions of computers with cryptojacking malware. Which brings us to the fundamental question: What can organizations do to protect themselves?  
In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Microsoft senior software engineer Amitrajit Banerjee and senior staff architect at Intel Rahul Ghosh to discuss the history and prevalence of cryptojacking. The push behind a cryptojacking attack is almost always motivated by money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging unless you cover high costs. They discuss the importance of understanding the actual concept of mining, how victims' CPU power and computing resources can be used, and why it isn't easy in general to detect crypto miners. 
  
In This Episode You Will Learn:    
How prevalent is cryptojacking and who should be worried When and how people are exposed to these new types of threats Why you should be familiar with cryptojacking  
Some Questions We Ask:    
How are victims' CPU power and computing resources used to mine cryptocurrencies? What created this environment where cryptojacking is possible? What are some general techniques when trying to identify cryptojacking?   
Resources:   
The increasing threat of cryptocurrency miners 
Defending against cryptojacking 
Guidance for preventing, detecting, and hunting for exploitation 
 
View Amitrajit Banerjee on LinkedIn 
View Rahul Ghosh on LinkedIn 
View Nic on LinkedIn  
View Natalia on LinkedIn  
  
Related:   
Listen to: Security Unlocked: CISO Series with Bret Arsenault     
Listen to: Afternoon Cyber Tea with Ann Johnson    
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.     

Hosted on Acast. See acast.com/privacy for more information.

The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created the world of cryptojacking, a form of cybercrime that remains completely hidden from the target and can infect millions of computers with cryptojacking malware. Which brings us to the fundamental question: What can organizations do to protect themselves?  
In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Microsoft senior software engineer Amitrajit Banerjee and senior staff architect at Intel Rahul Ghosh to discuss the history and prevalence of cryptojacking. The push behind a cryptojacking attack is almost always motivated by money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging unless you cover high costs. They discuss the importance of understanding the actual concept of mining, how victims' CPU power and computing resources can be used, and why it isn't easy in general to detect crypto miners. 
  
In This Episode You Will Learn:    
How prevalent is cryptojacking and who should be worried When and how people are exposed to these new types of threats Why you should be familiar with cryptojacking  
Some Questions We Ask:    
How are victims' CPU power and computing resources used to mine cryptocurrencies? What created this environment where cryptojacking is possible? What are some general techniques when trying to identify cryptojacking?   
Resources:   
The increasing threat of cryptocurrency miners 
Defending against cryptojacking 
Guidance for preventing, detecting, and hunting for exploitation 
 
View Amitrajit Banerjee on LinkedIn 
View Rahul Ghosh on LinkedIn 
View Nic on LinkedIn  
View Natalia on LinkedIn  
  
Related:   
Listen to: Security Unlocked: CISO Series with Bret Arsenault     
Listen to: Afternoon Cyber Tea with Ann Johnson    
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.     

Hosted on Acast. See acast.com/privacy for more information.

35 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
The Neuron: AI Explained
The Neuron
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod