Identifying detection opportunities in cryptojacking attacks
Lacework
JULY 21, 2022
Lacework Labs often sees remote access methods co-deployed with cryptomining malware (IRC bots, dropped ssh keys, etc.). Before deploying cryptomining malware and associated payloads, an attacker needs to deploy their malware on a target host. This often results in the first payload (e.g.,
Let's personalize your content