Hackers Use Crypto Mining Software To Attack Cos
Hackers might have another way to steal data from corporations: cryptomining software.
Troy Kent, a threat researcher at Awake Security, presented his findings at the InfoSecurity North America Conference in New York earlier this month.
“With this attack, people are using a tool, a crypto miner that they’re used to seeing on their network. But they’re not used to responding to it as though it is a legitimate threat, like a botnet or a Trojan,” Kent said in an interview with CNBC. “They can come in and they can steal files, they can steal intellectual property, they can steal credentials and then log in as maybe the CEO. Or they can download more software. They can bring down services.”
Dig Deeper with These Resources
Real World Incidents Detected and Stopped by Awake
Organizations across industries use Awake every day to identify and stop modern threats from both internal and…
EMA Top 3 Report and Decision Guide for Security Analytics
This Enterprise Management Associates (EMA) report identifies the leading priorities organizations face with resolving challenges and meeting…