Cryptocurrency: Cybercrime’s New Favorite Tool | SC Media
Intrusion detection, Security research, Blue team

Cryptocurrency: Cybercrime’s New Favorite Tool

June 1, 2021
Courtesy Quoteinspector.com
  1. Browser-based: largely javascript-based, these miners are only active as long as a given website or browser tab remains open. The threat to the device and organization is minimal.
  2. Software-based: these miners, for all intents and purposes are installed on systems in the same ways malware gets installed and will persist and survive reboots using similar methods. By running as a dedicated process on a system, they can cause more damage and lead to other types of attacks.
Adrian Sanabria

Adrian joined SC Media’s parent company, CyberRisk Alliance in 2020. He will focus primarily on cybersecurity product reviews, but will also provide industry insight trends for both SC Media and Security Weekly (another CyberRisk Alliance company). He brings two decades of industry experience, working as a practitioner, penetration tester, and industry analyst. He spent the last few years as an entrepreneur, challenging norms in sales and marketing for a variety of vendors. Adrian loves to cook, eat, hike, play music and regale his teenagers with stories of what the early days of the Internet were like.

prestitial ad