Identifying detection opportunities in cryptojacking attacks
Lacework
JULY 21, 2022
Lacework Labs often sees remote access methods co-deployed with cryptomining malware (IRC bots, dropped ssh keys, etc.). Before deploying cryptomining malware and associated payloads, an attacker needs to deploy their malware on a target host. Adversary Challenge – Hiding Outbound Network Connections.
Let's personalize your content