Cryptojacking & Coinhive: The Risks Are Real

ABSTRACT
Less than a year ago, Coinhive changed the history of cryptomining. In September 2017, Coinhive launched a service that enabled the mining of the Monero digital currency—directly within a web browser.

The Coinhive API offers access for website owners to deploy a miner on their site, have it communicate with the Coinhive remote server, and allow the miners to run on user systems, without user permission. This capability creates a vast attack surface for threat actors to exploit to their advantage.



KEY TAKEAWAYS

  • The techniques, tactics, and procedures utilized within the Coinhive exploit
  • How can Coinhive impact your IOT devices. And the consequences if your organization is compromised.
  • The key indicators of compromise (IOC) that may impact your business
  • What you can do to proactively protect your business from Coinhive and other threats

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language