To enable them, please visit our privacy policy and search for the Cookies section. Select "Click Here" to open the Privacy Preference Center and select "Functional Cookies" in the menu. You can switch the tab back to "Active" or disable by moving the tab to "Inactive." Click "Save Settings."
Cryptojacking & Coinhive: The Risks Are Real
ABSTRACT
Less than a year ago, Coinhive changed the history of cryptomining. In September 2017, Coinhive launched a service that enabled the mining of the Monero digital currency—directly within a web browser.
The Coinhive API offers access for website owners to deploy a miner on their site, have it communicate with the Coinhive remote server, and allow the miners to run on user systems, without user permission. This capability creates a vast attack surface for threat actors to exploit to their advantage.
KEY TAKEAWAYS
- The techniques, tactics, and procedures utilized within the Coinhive exploit
- How can Coinhive impact your IOT devices. And the consequences if your organization is compromised.
- The key indicators of compromise (IOC) that may impact your business
- What you can do to proactively protect your business from Coinhive and other threats