Identifying detection opportunities in cryptojacking attacks
Lacework
JULY 21, 2022
Lacework Labs often sees remote access methods co-deployed with cryptomining malware (IRC bots, dropped ssh keys, etc.). Finally, threat groups focused on ransomware or extortion campaigns could purchase and abuse this access for monetary gain. This often results in the first payload (e.g.,
Let's personalize your content