Post

Cryptominers’ Anatomy Shutting Down Mining Botnets

Cryptominers’ Anatomy Shutting Down Mining Botnets

Introduction

Welcome to the final installment of our Cryptominers’ Anatomy blog series:

In our first post, we discussed cryptocurrencies’ fundamentals, their various attributes, and what makes some of them more attractive than others to threat actors.

In the second part, we analyzed various cryptomining samples that we found abusing different mining topologies.

In this third and final blog post in the series, we will explore two novel proactive techniques that can be used to defeat cryptominers.

To read the complete article see: https://www.akamai.com/blog/security-research/cryptominers-anatomy-shutting-down-mining-botnets

This post is licensed under CC BY 4.0 by the author.