Hackers might have another way to steal data from corporations: cryptomining software.

Troy Kent, a threat researcher at Awake Security, presented his findings at the InfoSecurity North America Conference in New York earlier this month.

“With this attack, people are using a tool, a crypto miner that they’re used to seeing on their network. But they’re not used to responding to it as though it is a legitimate threat, like a botnet or a Trojan,” Kent said in an interview with CNBC. “They can come in and they can steal files, they can steal intellectual property, they can steal credentials and then log in as maybe the CEO. Or they can download more software. They can bring down services.”

Read More…

Security Research