Categories: Tech

Crypto Mining – Cloud systems are under attack

According to the latest research Trend Microcloud systems are under attack Crypto Mining and cybercriminal groups dedicated to mining crypto currencies are intent on grabbing as many resources as possible. Let’s find out in more detail what emerged.

Crypto Mining – Trend Micro Research

According to what emerges from the research A Floating Battleground. Navigating the Landscape of Cloud-Based Cryptocurrency Mining Of Trend Micro (global cybersecurity leader), cybercriminals are increasingly looking for holes.

More specifically, cybercriminals exploit exposed instances and constantly search for weak SecureShell (SSH) logins through brute force attacks. Their goal is to compromise cloud assets for cryptocurrency mining.

The elements exploited by cybercriminals to gain access to systems are often characterized by having outdated software, a non-compliant cloud security posture, and inadequate knowledge of how to secure cloud services. For this reason, investments in cloud computing increased during the pandemic. However, the ease with which assets can be deployed has left many cloud instances exposed online unpatched or misconfigured.

The additional computational costs of mining can slow down key user-facing services and increase operational costs by up to 600% on each infected system. Cryptocurrency mining can also be the alarm of a more serious compromise. Many cybercriminals implement mining software to get extra revenue before online shoppers buy access for ransomware, data theft, and more.

Prevention is better than cure

To stem threats from cloud cryptocurrency mining attacks, Trend Micro recommends a number of things.

First you need to make sure your systems are up to date and run only the required services. Then you need to implement firewalls, IDS / IPS and a security cloud endpoint to limit and filter outgoing and incoming network traffic. And also eliminate configuration errors through Cloud Security Posture Management tools. It is also essential to monitor the connections of the inbound and outbound cloud instances and filter the domains associated with known mining pools.

Finally, it’s a good idea to set up rules to monitor open ports, DNS routing changes, and CPU resource usage from a cost standpoint.

The statements

“Even a few hours of compromise could translate into profits for the cybercriminals. This is why we are witnessing a constant struggle for computational resources in the cloud ”. She stated Salvatore Marcis, Technical Director of Trend Micro Italia. “Threats like this require organized and distributed security to make sure the bad guys have nowhere to hide. The right platform supports teams in maintaining visibility and control of their cloud infrastructure, mapping the attack surface, assessing its risks, and applying the right protection without adding excessive runtime costs. “

For further information, please refer to the Trend Micro website.

While waiting to always discover new information, stay tuned on the techprincess pages for new interesting news and insights. As always, tell us your opinion on our Facebook page.

Published by
Walker Ronnie

Recent Posts

The psychology of music in video games: from adventure to horror

We all know that good musical accompaniment depends on the success of a good game,…

3 hours ago

The most watched TV series on Netflix, HBO and Disney+ in 2024

What are the most watched TV series on Netflix, HBO and Disney+ in 2024 to…

3 hours ago

Google Pixel 8a: everything we know before launch

Here are all the technical specifications of the Google Pixel 8a arriving in mid-May, with…

3 hours ago

F1, GP Miami: here are the results of the Sprint Race

After yesterday's qualifying, today was the turn of the Sprint Race of the Miami GP.…

3 hours ago

Milan-Genoa: where to watch the match?

An interesting challenge that could provide a lot of entertainment. Let's find out where to…

4 hours ago

Blockchain: what it is, from technology to applications

In this dedicated guide we want to explore with you what Blockchain is and how…

4 hours ago