PDF Publication Title:
Text from PDF Page: 019
THE ILLICIT CRYPTOCURRENCY MINING THREAT “kworker,” “mshelper,” “-zpool,” “-zpsw,” “-zwal,” “—farm-recheck,” “-ewal,” “-epool,” “-esw,” “-no- fee,” “stratum+tcp,” “—max-cpu-usage=,” “— donate-level=,” “cgminer.” • Monitor firewall and web proxy logs; look for domains associated with known cryptocurrency mining pools or browser-based coin miners, e.g., coinhive[.]com43. • Block communication protocols for mining pools. • Conduct real-time performance and system monitoring, e.g., Intrusion Detection Software (IDS) to perform pattern matching to spot specific strings/patterns in network traffic. You can use applications such as Snort to create pattern matching and utilize open-source IDS signatures for maintaining rules for IDSs. • Blacklisting network traffic. Organizations can block IPs, SSL certificates, and domains of mining sites. However, they should be aware that many of these sites now rank inside Alexa’s top 1 million most popular, a standard list used in whitelisting known legitimate sites44, and thus ordinarily would not be blocked. • Apply application whitelisting. Use application whitelists to prevent unknown executables from launching autonomously. • Consistently keep up-to-date with latest vulnerabilities and patch servers. Often, illicit mining malware is delivered to servers via scan-and-exploit campaigns. Popular targets include servers such as Oracle Weblogic, Struts 2, and Jenkins. • Strengthen FTP servers if they allow anonymous logins. Actors have been observed targeting anonymous FTP servers to install illicit mining worms. • Monitor traffic for abnormal get requests. Malicious actors have been observed pulling down malware from file servers post-exploit. • Look for outgoing connections over typical mining ports like 3333, 4444, and 8333. Note that pool mining, which is used in the majority of illicit cryptocurrency mining, will generally occur over ports 8080 and 443, and not these ports. • Monitor for signs of persistence, e.g., runkeys, WMI, or scheduled tasks. Snort is an open-source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. Snort rules can be useful in preventing miners from being downloaded, as well as in blocking mining commands, access to mining pools, and to the command and control infrastructure of the malware itself. Using Snort, organizations can also block SSL certificates used by Monero, CryptoNight, Coinhive, AuthedMine, and other cryptocurrencies. Snort has three categories of rules dealing with mining: 1. Rules blocking incoming clients, including downloads of miners: SIDs: 44692-44693, 45265-45268, 45809- 45810, 45949-45952, 46365-46366, 46370-46372 2. Malware variants specifically known to mine cryptocurrency on victim networks: SIDs: 20035, 20057, 26395, 28399, 28410-28411, 29493- 29494, 29666, 30551-30552, 31271-31273, 31531-31533, 32013, 33149, 43467-43468, 44895-44899, 45468- 45473, 45548, 45826-45827, 46238-46240 3. Rules identifying common Stratum protocols, focusing on identification, and blocking of protocols used by cryptocurrency workers: SIDs: 26437, 40840-40842, 45417, 45549-45550, 45825, 45955 43 https://www.csoonline.com/article/3267572/encryption/how-to-detect-and-prevent-crypto-mining-malware.html 44 https://blog.netlab.360.com/file/top_web_mining_sites. txt 19PDF Image | ILLICIT CRYPTOCURRENCY MINING THREAT
PDF Search Title:
ILLICIT CRYPTOCURRENCY MINING THREATOriginal File Name Searched:
CTA-Illicit-CryptoMining-Whitepaper.pdfDIY PDF Search: Google It | Yahoo | Bing
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info
Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info
CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com | RSS | AMP |