Cryptominers’ Anatomy Shutting Down Mining Botnets
Cryptominers’ Anatomy Shutting Down Mining Botnets
Introduction
Welcome to the final installment of our Cryptominers’ Anatomy blog series:
In our first post, we discussed cryptocurrencies’ fundamentals, their various attributes, and what makes some of them more attractive than others to threat actors.
In the second part, we analyzed various cryptomining samples that we found abusing different mining topologies.
In this third and final blog post in the series, we will explore two novel proactive techniques that can be used to defeat cryptominers.
To read the complete article see: https://www.akamai.com/blog/security-research/cryptominers-anatomy-shutting-down-mining-botnets
This post is licensed under CC BY 4.0 by the author.