Anatomy of a Hack: How Cryptojacking Works, Why It’s Growing, Its Risks and Detection

Register Now

On-Demand Webcast with Ultimate Windows Security & Rapid7 

As the value of cryptocurrencies go up and down, it makes legitimate crypto-mining endeavors a volatile mix of risk and reward. But...if you can get your computing power, cooling and electricity for free – that’s an entirely different proposition. And that’s exactly what cryptojacking offers. In fact, it’s been attractive enough to put a sizable dent into the use of ransomware.

Cryptojacking requires less privilege and can be silent with regard to the file system. The only thing really needed is the ability to run code and communicate with the mining coordination server. That means cryptojacking can occur on the browser level with JavaScript. Cryptojacking has its roots in a well-intentioned effort to replace ads with a less annoying source of revenue for free sites. But like many things, that technology has been bent to evil designs.

In this webinar, we’ll look at the current landscape of cryptojacking and show you how it works. We’ll try to infect a lab system with this “parasitic” type of malware and see what it does to the system. We’ll talk briefly about the other types of cryptocurrency besides classic Bitcoin that come up when you discuss cryptojacking. Then we’ll discuss the risks and how you can detect it. 

Speakers

Randy Smith


Ultimate Windows Security

Eric Sun

Senior Solutions Manager
Rapid7

Register Now

Fill out the form to watch the webcast