Cloud cryptojacking – hijacking cloud resources to mine for cryptocurrency – is currently the fastest-growing cybersecurity threat to the enterprise.

A recent Bitglass report found that almost half of organisations have malware in one of their cloud applications.

In particular, this year, cloud cryptojacking malware has become one of the biggest threats to organisations. This malware sees cybercriminals regularly stealing processing power from devices and other resources in order to mine cryptocurrency.

The trend is showing no signs of slowing down anytime soon.

This is because the rising popularity and value of cryptocurrencies like Bitcoin and Monero have made large-scale cryptojacking a highly lucrative proposition.

As such, it should come as no surprise that hackers are targeting data centres and vulnerable websites that can help them boost their mining capabilities.

How well do you really know your competitors?

Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.

Company Profile – free sample

Thank you!

Your download email will arrive shortly

Not ready to buy yet? Download a free sample

We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below form

By GlobalData
Visit our Privacy Policy for more information about our services, how we may use, process and share your personal data, including information of your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

Today, cloud-based resources are typically the main focus for hackers looking to mine cryptocurrency. In particular, infrastructure-as-a-service (IaaS) platforms are being targeted because they offer virtually infinite resources and an environment where attackers can operate under the radar and go largely undetected.

Cloudjacking and cryptojacking: a perfect storm

The threat delivery methods used by cybercriminals to initiate cryptojacking are similar to those utilised for other types of threats, such as ransomware or adware.

Typically, hackers will use phishing emails to load cryptomining code onto a device, or they will infect a website with JavaScript code that auto-executes once loaded into the victim’s browser.

This code then runs surreptitiously in the background, meaning it can take a significant amount of time before individuals realise they’ve been compromised.

As briefly noted above, criminals are combining cloudjacking – the act of stealing processing power and storage from a cloud account – with cryptojacking. In this way, they are able to accelerate the rate at which they illicitly mine cryptocurrency.

Tesla is just one of the high-profile organisations to fall victim to this type of attack.

Earlier in 2018, it was discovered that some of its Amazon Web Services (AWS) infrastructure was being appropriated for mining.

The criminals responsible for the attack concealed their activities from conventional firewall and intruder detection systems by hiding the IP addresses of their mining programs behind a content delivery network; they also throttled the mining software to ensure that it did not trigger high-usage-detection systems.

How to prevent cloud cryptojacking: the basics

Incorporating cryptojacking into your existing employee security awareness training is a vital preventative step. The more employees know, the better equipped they will be to avoid falling prey to an attack.

As always, it’s important to focus on the way that hackers use highly targeted phishing techniques to gain access to IT environments.

Additionally, as many attacks are delivered via auto-executing cryptojacking scripts on websites, deploying ad-blocking and anti-cryptomining extensions on web browsers is also critically important.

Next, a simple and effective step is to make sure that strong passwords and multi-factor authentication are in place for all cloud apps and IT assets. Attackers compromised Tesla’s environment through an administration console that was not password protected.

Exchanging default passwords for strong, alphanumeric credentials and enforcing multi-factor authentication are must-haves for ensuring the protection of sensitive enterprise assets.

Prioritise first-line defence efforts

Promptly installing patches and software updates is another action that will ensure endpoints and cloud-based tools have their security gaps filled, protecting them from the latest threats. Many successful cloud cryptojacking attacks have exploited well-known vulnerabilities that were left unsecured by enterprises and employees who failed to implement patches in a timely manner.

Similarly, deploying cloud-based advanced threat protection (ATP) helps defend against known and zero-day malware that can be used to launch cryptomining attacks.

With the correct tool in place, any threat can be detected and blocked as it is uploaded to any app, downloaded to any device, or at rest in the cloud. This is ideally achieved through an agentless solution because agent-based endpoint tools like mobile device management (MDM) can harm device functionality, invade user privacy, and, consequently, prove incredibly difficult to deploy on employees’ personal devices.

As bring your own device (BYOD) is becoming common within the vast majority of organisations, securing personal devices through agentless solutions is an absolute must.

In recent months, there’s been a sharp increase in the number of reported cryptojacking incidents. Organisations cannot afford to ignore the threat that malicious mining poses.

In addition to increasing energy costs, attacks can also harm system performance for users and customers – which can cause lasting brand damage.

By rigorously reviewing first-line defences, organisations can ensure that they do not become victims of this latest pernicious cyber threat.


Read more: How NASA CIO Renee Wynn manages IT above the clouds