logo

From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native

Authors:   Mor Weinberger


Abstract

Ever since cryptomining had emerged as a novel promising digital currency technology, its evil twin cryptojacking has gained popularity and become a major type of attack. Threat actors consider this attack as a low hanging fruit which allows them to easily cash out their attack, since one can easily convert compute power into digital coins. Moreover, defenders often mistakenly perceive this attack as a noisiness rather than an attack that allows to freely run remote code on your server. At first threat actors deployed cryptominers on unpatched servers and targeted browsers. Today attackers focus on the cloud native, including exploiting containers, Kubernetes, CI/CD and SCM platforms. In this Talk, we’ll explore the key concepts and techniques related to the evolvement of cryptomining and also explain on how to proactively protect your environment with open-source tools and approaches that will help you strengthen your security starting from static analysis and up to runtime protection. Below are some of the topics we shell include:Reviewing of attacks, techniques & exploits. The main challenges threat actors face and overcome, how they maximize their gain and conceal their attacks Finally, we will present measures to mitigate and strengthen your environments

Materials:

Tags:

Post a comment

Related work

Conference:  BlackHat USA 2021
Authors:
2021-11-10

Conference:  Defcon 31
Authors: Vangelis Stykas CTO at Tremau
2023-08-01


Conference:  Defcon 31
Authors: Bill Demirkapi Microsoft Security Response Center
2023-08-01

Conference:  Defcon 31
Authors: Andréanne Bergeron Cybersecurity Researcher, GoSecure, Olivier Bilodeau Cybersecurity Research Director at GoSecure
2023-08-01