Black Hat is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cryptojacking Meets IoT

This webcast was presented in two time-zones:

  • Pacific Time

    View Recording

    Thursday, July 19, 2018
    11:00AM-12:00PM PDT

  • British Time

    View Recording

    Friday, July 20, 2018
    11:00AM-12:00PM BST

Brought to you by:

Cryptocurrency Cheatsheet, by Sherri Davidoff
"Cryptomining versus Cryptojacking - What's the Difference?" by Paul Ducklin

“Cryptojacking" is the latest trend for criminals, who hijack your computers, install cryptocurrency miners, and use stolen information from your databases to set up wallets for illicit funds transfers. Hackers are busily infecting the Internet of Things, developing new IoT bonets, following the publication of the Mirai source code and the “success” of Reaper and Satori.

What happens when cryptojacking meets the Internet of Things? By 2020, researchers estimate there will be 30 billion IoT devices in the world. Many of these devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities, and poorly monitored—a perfect recipe for criminals to install mining software and lurk, racking up money.

In this webinar, we'll show you a cryptojacking attack, complete with screenshots of the criminal’s web surfing history and falsified documents uncovered through forensic analysis. Then we'll analyze what happens when IoT devices are infected with cryptojacking. What are the risks to your organization? How can you detect and prevent IoT cryptojacking attacks?


Sherri Davidoff

Sherri Davidoff has 15 years of experience as a cyber security professional, specializing in digital forensics, penetration testing and security awareness training. Sherri has authored courses for the SANS Institute and Black Hat, and conducted security training for the American Bar Association, Department of Defense, Google, Comcast, Los Alamos National Laboratories, and many others. Sherri Davidoff is the CEO of LMG Security and the co-author of "Network Forensics: Tracking Hackers Through Cyberspace".

Sponsor Speaker:

Paul Ducklin

Paul Ducklin, Senior Technologist, has been many things at Sophos: programmer, malware analyst, technical supporter, public speaker, security evangelist, and now proselytiser. Paul spends most of his time writing for Sophos's award-winning community website, Naked Security, where he has built up a global reputation as the go-to guy for explaining even the most technical issues.





Sign up to receive information about upcoming Black Hat events including Briefings, Trainings, speakers, and important event updates.


Sustaining Partners