April 03, 2018

Avoid Becoming a Crypto-Mining Bot: Where to Look for Mining Malware and How to Respond

1 min. read

There’s a lot of speculation in cryptocurrency right now. People are mining coins all over the place, and even though it’s getting harder and harder to make money mining coins, interest is still high. All it costs is money for the power bill.

So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency, to the tune of millions of dollars. You could do it just by plugging in a 1900 watt, whisper quiet, terahash ASIC miner at your desk at work. 1900 watts would be generated by 30 old-style light bulbs. Would anyone notice that in an office building?

Others scale the mining operation bigger and reduce their chance of getting caught by mining coins in malware botnets. There have been recent assertions that ransomware is yesterday’s news, because bot herders have found that mining is more profitable and less likely to be detected.

But cryptomining can be detected.

Read the full article published February 28, 2018 here: by Security Week.

Join the Discussion


Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.