Cryptocurrency Cheatsheet, by Sherri Davidoff
"Cryptomining versus Cryptojacking - What's the Difference?" by Paul Ducklin
"Cryptojacking" is the latest trend for criminals, who hijack your computers, install cryptocurrency miners, and use stolen information from your databases to set up wallets for illicit funds transfers. Hackers are busily infecting the Internet of Things, developing new IoT bonets, following the publication of the Mirai source code and the "success" of Reaper and Satori.
What happens when cryptojacking meets the Internet of Things? By 2020, researchers estimate there will be 30 billion IoT devices in the world. Many of these devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities, and poorly monitored—a perfect recipe for criminals to install mining software and lurk, racking up money.
In this webinar, we'll show you a cryptojacking attack, complete with screenshots of the criminal's web surfing history and falsified documents uncovered through forensic analysis. Then we'll analyze what happens when IoT devices are infected with cryptojacking. What are the risks to your organization? How can you detect and prevent IoT cryptojacking attacks?