PDF Publication Title:
Text from PDF Page: 021
THE ILLICIT CRYPTOCURRENCY MINING THREAT 5. Monitor remote users who access the administrative shares. Lateral movement can also be executed through worm propagation via known vulnerabilities such as EternalBlue. Finally, the actors need to execute the malware to begin mining operations. This can happen through remote management tools, such as SC, AT, WinRS and Schtasks, which can add tasks that can be scheduled to run at certain times of the day to avoid detection. There’s also PowerShell, WMI, and PSEXEC, which are legitimate Windows processes that malicious actors use to remotely execute malware. Network defenders are encouraged to monitor the usage of these tools and processes within their networks and enable improved logging within the networks and review those logs on a regular basis. CTA’S ROLE IN PROTECTION CTA members are regularly sharing information and technical indicators on cyber threats to ensure a broader awareness of malware and the tactics, techniques, and procedures malicious cyber actors use. CTA members take that information and build it into their products and services, ensuring their customers are protected from known threats. This protection extends to the threat posed by illicit cryptocurrency mining. CTA members’ products benefit from the information and analysis of all of our members. Combining best practices, good cyber hygiene, and the recommendations laid out above with the endpoint and network security products offered by a CTA member will help your organization mitigate the risk from illicit cryptocurrency mining. VI. PREDICTED EVOLUTION OF ILLICIT MINING Illicit cryptocurrency mining shows no signs of being just a phase for threat actors. The landscape in which a mining payload can be deployed is vast and will only continue to expand, whether that be to IoT devices, servers, end-user systems, or mobile devices. We expect illicit cryptocurrency mining to continue to prey on individuals and organizations that have not implemented sufficient security practices and cyber hygiene recommendations like those made in this report. The threat of illicit cryptocurrency mining will continue to grow as long as cryptocurrency value remains high and an infrastructure exists for actors to anonymously and easily leverage mining to generate revenues. The pervasiveness of this threat is dependent on the volatile nature of cryptocurrency. Fortinet’s second quarter 2018 Threat Landscape Report47 notes that there is a “moderate positive correlation between the market price of cryptocurrencies and malware designed to illicitly mine those currencies” as seen in Figure 13 below for Bitcoin. Fortinet noted that a similar pattern was found for Monero in the same report. Network defenders will need to be prepared for multiple scenarios as cryptocurrency value increases or decreases. CTA believes that other public and private blockchains should be prepared to face illicit mining attacks and expects that nation state actors may begin, or perhaps have already begun, to leverage illicit cryptocurrency mining to fund and provide anonymity to their operations. This section explores how the threat from illicit cryptocurrency mining may change in the future. 47 https://www.fortinet.com/blog/threat-research/threat-landscape-report--virtually-no-firm-is-immune-from-severe.html 21PDF Image | ILLICIT CRYPTOCURRENCY MINING THREAT
PDF Search Title:
ILLICIT CRYPTOCURRENCY MINING THREATOriginal File Name Searched:
CTA-Illicit-CryptoMining-Whitepaper.pdfDIY PDF Search: Google It | Yahoo | Bing
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info
Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info
CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com (Standard Web Page)