When deploying ‘cryptojacking’ malware, the attacker abuses the processing power of a victim's machine in order to mine cryptocurrency.
With the advent of the browser-based mining scripts, cybercriminals have evolved their cryptojacking campaigns from delivering malware payloads via traditional methods to surreptitiously mining for cryptocurrency by injecting code into a compromised website, unbeknownst to the site owner.
In this report you will learn:
- About the cryptojacking threat
- The details of a recent cryptojacking campaign
- How websites are compromised to generate cryptocurrency by abusing the processing power of each website's visitors
- What you can do to mitigate these threats
Get the full report to ensure what you can do to keep your organization secure from cryptojacking.