Antivirus solutions, firewalls, secure web gateways and URL filtering cannot reliably detect cryptominer code and have proved ineffective at preventing it from auto-executing within endpoint browsers, writes Carolyn Crandall, chief deception officer at Attivo Networks.
The cryptocurrency boom has encouraged attackers to expand their focus from other methods such as utilizing malware to steal data and impose ransoms or launching a disruptive DDoS attack, to employing tools and techniques to gain access to the computing power of enterprises to generate cryptocurrency payouts, writes Carolyn Crandall, chief deception officer at Attivo Networks.