SlideShare a Scribd company logo
What is Cryptojacking and
How Can I Protect Myself?
Presented by Dave Buster, CISSP
© Global Knowledge Training LLC. All rights reserved. Page 2
Your Panelists
Dave Buster
Senior Cybersecurity Portfolio
Director
© Global Knowledge Training LLC. All rights reserved. Page 3
Cryptojacking?
© Global Knowledge Training LLC. All rights reserved. Page 4
What is:
• Blockchain?
• Bitcoin?
• Hashing?
• Mining?
• Cryptocurrency?
Definitions?
© Global Knowledge Training LLC. All rights reserved. Page 5
Blockchain is a technology to publicly distribute immutable
information across multiple computers.
• Information is stored in “blocks” of data that are passed
around. (Distributed)
• Most implementations use some sort of hashing to insure the
integrity of blocks. (Immutable)
• Each block includes the hash of the previous block- hence
the term “block chain”
• Various protocols are used to distribute updates across all
computers.
• The computers then verify and agree on legitimate
transactions to add to the next block.
• In order to get them to cooperate to do the work, some sort
of reward must be offered.
• One of the first useful implementations of the concept was
“Bitcoin”.
Blockchain technology (Generic view)
© Global Knowledge Training LLC. All rights reserved. Page 6
In 2009, someone using the name Satoshi Nakamoto wrote a white paper outlining
a scheme to use Blockchain technology as a new form of public “cryptocurrency”.
• Bitcoin uses “proof of work” to award new Bitcoins to computers who build and
verify the blocks.
• Because new coins come into existence as rewards, they are called “miners”.
• The rewards get smaller over time, while the difficulty of the work increases.
This helps make bitcoins more valuable and scale.
• There can only be a maximum of 21 Million Bitcoins ever created. As of
January 2018, about 16.7 million have been mined (released).
• A user can create a “wallet” to hold coins. The public address is used to
receive money, but a private (secret) key is required to send money.
Bitcoin
By Zhitelew - Own work, CC0,
https://commons.wikimedia.org/w/index.php?curid=40617621
Bitcoin Transactions per month
Is it money?
IF a buyer and a seller agree, then it is.
Rational actors will only hold a commodity if they
believe it will hold value and can be traded to
someone else later.
A student showed his
Bitcoin public address on
ESPN…and collected over
$20K
© Global Knowledge Training LLC. All rights reserved. Page 7
SHA-256 is one of a family of mathematical algorithms that produce a unique
digital signature for any data input into the calculation.
• The hash is “computationally difficult” to compute, but easy to verify.
• No matter how many bits in the source file, the output is always 256 bits.
(It is recursive.)
• It is impossible to predict what a hash will be for a given block of data
without actually doing all of the calculation (no short cuts or estimates).
What is a the SHA-256 Hash?
"Hello, world!0" => 1312af178c253f84028d480a6adc1e25e81caa44c749ec81976192e2ec934c64
"Hello, world!1" => e9afc424b79e4f6ab42d99c81156d3a17228d6e1eef4139be78e948a9332a7d8
"Hello, world!2" => ae37343a357a8297591625e7134cbea22f5928be8ca2a32aa475cf05fd4266b7
...
"Hello, world!4248" => 6e110d98b388e77e9c6f042ac6b497cec46660deef75a55ebc7cfdf65cc0b965
"Hello, world!4249" => c004190b822f1669cac8dc37e761cb73652e7832fb814565702245cf26ebb9e6
"Hello, world!4250" => 0000c3af42fc31103f1fdc0151fa747ff87349a4714df7cc52ea464e12dcd4e9
Examples of hashes: (we typically don’t show 1’s and 0’s. So, 64 characters x 8 bits = 256 bits)
• Note that changing a single bit changes the entire hash, and it’s completely unpredictable (Avalanche effect).
• If you want 4 leading zeros, you would have to test 4,250 additional numbers until you found a hash that works.
© Global Knowledge Training LLC. All rights reserved. Page 8
Mining is a reward system based on proof of work.
• Bitcoin uses the SHA-256 Hash algorithm to create a unique digital signature (hash) for each block.
• Bitcoin adds difficulty by requiring that the computer add a random number (called a “nonce”) to the
block with the goal of getting the final hash to have some number of leading zeros. (Yes, it’s a bit
arbitrary, but it works.)
• The first miner to find a nonce that returns the correct number of leading zeros (currently 18) wins
some Bitcoins (currently 12.5). That block and hash are then distributed.
• The Bitcoin network mines a new block about every 10 minutes.
What is bitcoin “mining”?
Home ASIC miner: Antminer U3 with a Raspberry Pi
acting as a supervisor. This rig calculates 50 GH/s (50
billion hashes per second) in the “Bitminter” pool.
After electricity costs, it makes a profit of about 17
cents per week. (January 2018). Sigh.
Bitminter Pool
dashboard
© Global Knowledge Training LLC. All rights reserved. Page 9
In addition to Bitcoin, there are hundreds of competing cryptocurrency coins
emerging. Most will fail.
Other Cryptocurrencies
Coinmarketcap.com
currently tracks about 1422
different crypto coins.
© Global Knowledge Training LLC. All rights reserved. Page 10
Blockchain and Cryptocurrencies use cybersecurity technologies:
• encryption
• hashing
There is ongoing development to use blockchain to benefit cybersecurity:
• Enhanced data availability (storage)
• Certificate management (Guardtime)
• Identification management (REMME)
• Trusted DNS (to prevent DDoS)
What about Cybersecurity?
© Global Knowledge Training LLC. All rights reserved. Page 11
The Dark Side of Cryptocurrencies
Anonymity supports illegal transactions:
• Ransomware payments
• Dark web transactions
© Global Knowledge Training LLC. All rights reserved. Page 12
There have been some high profile cryptocurrency hacks:
• Mt. Gox
• In June of 2011, a hacker broke in, transferred and then sold bitcoin. Losses were about
$8,750,000.
• In February of 2014, transaction malleability attack forced Mt. Gox to declare bankruptcy.
• Ethereum DAO attack
• In June of 2016, someone manipulated a contract programming loophole and stole about a
third of all Ether coins before the leak was detected. (~$50M dollars). It caused Ethereum
to split into “Ethereum Classic(ETC)” and Ethereum(ETH).
• Bitfinex attack
• In August of 2016, the Hong Kong based exchange was attacked and about $72M in
Bitcoins was stolen.
• NiceHash attack
• In December of 2017, the Slovenian bitcoin mining was hacked and about $80M in Bitcoins
were stolen.
What about the bad guys?
Never the less, cryptocurrencies continue to move forward.
© Global Knowledge Training LLC. All rights reserved. Page 13
Mining software that runs as Javascript in the browser.
A link to the software can be included in any web page.
When you go to that web page, they can cause your
computer to start mining cryptocurrency for them.
Top 3 cryptojacking companies:
• Coinhive
• JSEcoin
• Cryptoloot
The companies split the profits with the web page
owner. These products are legal, and being offered as
a substitute for advertising revenue. However, the web
site owners don’t have to tell the users.
The next trend: Cryptojacking
These miners typically mine Monero coins,
because Bitcoin difficulty is too high.
© Global Knowledge Training LLC. All rights reserved. Page 14
Coinhive pays out about 0.00015 XMR (Monero) per 1 million hashes.
Data: A typical laptop computer can do about 30 H/s
Cryptojacking by the numbers
Advertising model
1000 users per day
1% click through ratio, payment $0.50 per click
Total: 10 clicks per day
Total daily revenue: $5.00 per day
Cryptojacking model
1000 users per day
30 H/s, 5 minute visit = 9000 H/user
Total hashes = 9 million hashes per day
Total daily revenue: $0.51
So, if Advertising pays 10 times better than Cryptojacking, why is Cryptojacking “a thing”?
If a website can be hacked, the hacker can add the cryptojacking code and
collect the reward for himself. The website owner would not even know.
© Global Knowledge Training LLC. All rights reserved. Page 15
Coinhive has been injected into many sites.
Hacked Websites
https://shop.subaru.com.au/
Note: The actual browser code can be easily viewed and
analyzed. A unique Coinhive ID is included so that the
hacker can be paid. Over 85% of them in the wild go
back to the same 2 Coinhive accounts (IDs).
© Global Knowledge Training LLC. All rights reserved. Page 16
Some downloadable apps contain hidden mining software.
They can:
• Slow down your cellphone
• Use up your battery
Some have been known to physically damage the phone by draining the
battery too quickly, causing it to overheat and swell.
Mobile risks
Loapi Malware on Android
© Global Knowledge Training LLC. All rights reserved. Page 17
Defenseᵌ: Human Element and 3D Defense
PROCESS
PEOPLE
TECHNOLOGY
More than “Defense in depth,” organizations need Defenseᵌ because cyber attacks happen across three dimensions.
Cyber attacks are people
attacking people, not machines
attacking machines, so an
educated workforce is critical.
© Global Knowledge Training LLC. All rights reserved. Page 18
Install anti-cryptojacking plug-ins in Chrome. Many Ad-blockers are starting pick them up as well.
Redirect: add 127.0.0.1 coin-hive.com coinhive.com to your hosts file.
Use a trusted DNS service. Examples:
 Google: 8.8.8.8, 8.8.4.4
 OpenDNS: 208.67.229.220, 208.67.222.222
 DNSWatch: 84.200.69.80, 84.200.70.40
 Norton Connectsafe: 199.85.126.10, 199.85.127.10
 Comodo Secure: 8.26.56.26, 8.20.247.20
If the computer slows down, check the process manager to see if the browser is using up too many
resources.
What should you do?
Note: Some cryptojackers are using “pop-under” techniques to hide the
running code (often under the bottom task bar) You may have to reboot.
Traffic to/from the miner is typically encrypted in TLS, and looks like
normal port 80 web traffic. It’s difficult to detect on the network.
© Global Knowledge Training LLC. All rights reserved. Page 19
Take That Next Step in your Cybersecurity Career
Foundational Courses:
Cybersecurity Foundations
Fundamentals of IS Security
Certification Courses:
CompTIA, (ISC)2, ISACA,
IAPP, EC-Council,
Product Courses:
Cisco, IBM, SonicWall, F5,
Dell, Palo Alto
© Global Knowledge Training LLC. All rights reserved. Page 20
Learning More
www.globalknowledge.com
For additional resources, visit us at…
Thank you!

More Related Content

PPTX
PacNOG 23: Introduction to Crypto Jacking
PDF
Blockchain Security Issues and Challenges
PPTX
Social engineering
PDF
API Security Best Practices & Guidelines
PDF
Social Engineering Attacks & Principles
PDF
Penetration testing & Ethical Hacking
PDF
Web Application Penetration Testing
PacNOG 23: Introduction to Crypto Jacking
Blockchain Security Issues and Challenges
Social engineering
API Security Best Practices & Guidelines
Social Engineering Attacks & Principles
Penetration testing & Ethical Hacking
Web Application Penetration Testing

What's hot (20)

PPTX
Phishing Attack : A big Threat
PPT
Ethical hacking a licence to hack
PDF
Secure Design: Threat Modeling
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Cryptocurrency
PPTX
Encryption
PPTX
Phishing Presentation
PPTX
Ransomware Attack.pptx
PPTX
Ransomware
PPT
P H I S H I N G
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
PDF
Analysing Ransomware
PDF
Blockchain, cryptography, and consensus
 
PPTX
Android Hacking + Pentesting
PPTX
Dos attack
PDF
Cyber Security Awareness
PPTX
Ethical Hacking
PDF
Network Forensics: Packet Analysis Using Wireshark
PDF
Bitcoin Addresses
PDF
Blockchain Technology And Cryptocurrency
Phishing Attack : A big Threat
Ethical hacking a licence to hack
Secure Design: Threat Modeling
CSE-Ethical-Hacking-ppt.pptx
Cryptocurrency
Encryption
Phishing Presentation
Ransomware Attack.pptx
Ransomware
P H I S H I N G
Bug Bounty Hunter Methodology - Nullcon 2016
Analysing Ransomware
Blockchain, cryptography, and consensus
 
Android Hacking + Pentesting
Dos attack
Cyber Security Awareness
Ethical Hacking
Network Forensics: Packet Analysis Using Wireshark
Bitcoin Addresses
Blockchain Technology And Cryptocurrency
Ad

Similar to What is Cryptojacking and How Can I Protect Myself? (20)

PDF
Bitcoin and Ransomware Analysis
PDF
Bitcoin and Ransomware Analysis
PPTX
Blockchain and Cryptocurrencies
PDF
Blockchain & Cryptocurrencies Intro - July 2017
PPTX
Digital currency
PPTX
#blockchain_hashin_bitcoin_cryptocurranies
PPTX
Hacking blockchain
PDF
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
PPTX
An in depth presentation of Cryptocurrency.
PPTX
MINING HUB SUMIT
PPTX
PPTX
PDF
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
PDF
Blockchain presentation v0617
PPTX
Introduction to Bitcoin and Crypto-currency
PPTX
what is crypto currency.pptx
PPTX
Understanding Blockchain
PPTX
Crypto currency presentation
PPTX
Blockchain
PPTX
CryptoJacking and Security: Evolution of a Hack
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Blockchain and Cryptocurrencies
Blockchain & Cryptocurrencies Intro - July 2017
Digital currency
#blockchain_hashin_bitcoin_cryptocurranies
Hacking blockchain
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
An in depth presentation of Cryptocurrency.
MINING HUB SUMIT
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
Blockchain presentation v0617
Introduction to Bitcoin and Crypto-currency
what is crypto currency.pptx
Understanding Blockchain
Crypto currency presentation
Blockchain
CryptoJacking and Security: Evolution of a Hack
Ad

More from Global Knowledge Training (20)

PPTX
Taking Advantage of Microsoft PowerShell
PPTX
PAN-OS - Network Security/Prevention Everywhere
PPTX
The Basics of Computer Networking
PPTX
How To Troubleshoot Group Policy in Windows 10
PPTX
Accelerating with Ansible
PPTX
Why Pentesting is Vital to the Modern DoD Workforce
PPTX
How to Maximize Your Training Budget
PPTX
Develop Your Skills with Unlimited Access to Red Hat Online Learning
PPTX
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
PPTX
What’s Next For Your Azure Certification Journey
PPTX
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
PPTX
How to Build a Winning Cybersecurity Team
PPTX
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
PPTX
How to Build a Web Server with AWS Lambda
PPTX
The Essence of DevOps: What it Can Mean for You and Your Organization
PPTX
How to Migrate a Web App to AWS
PPTX
How to Make Agile Project Management Work in Your Organization
PDF
How the Channel Can Break Down the Barriers to Cloud Success
PPTX
How to Avoid Cloud Migration Pitfalls
PPTX
Tackling 5 Taboo Topics in Cybersecurity People Management
Taking Advantage of Microsoft PowerShell
PAN-OS - Network Security/Prevention Everywhere
The Basics of Computer Networking
How To Troubleshoot Group Policy in Windows 10
Accelerating with Ansible
Why Pentesting is Vital to the Modern DoD Workforce
How to Maximize Your Training Budget
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
What’s Next For Your Azure Certification Journey
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
How to Build a Winning Cybersecurity Team
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
How to Build a Web Server with AWS Lambda
The Essence of DevOps: What it Can Mean for You and Your Organization
How to Migrate a Web App to AWS
How to Make Agile Project Management Work in Your Organization
How the Channel Can Break Down the Barriers to Cloud Success
How to Avoid Cloud Migration Pitfalls
Tackling 5 Taboo Topics in Cybersecurity People Management

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

What is Cryptojacking and How Can I Protect Myself?

  • 1. What is Cryptojacking and How Can I Protect Myself? Presented by Dave Buster, CISSP
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Your Panelists Dave Buster Senior Cybersecurity Portfolio Director
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Cryptojacking?
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 What is: • Blockchain? • Bitcoin? • Hashing? • Mining? • Cryptocurrency? Definitions?
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 Blockchain is a technology to publicly distribute immutable information across multiple computers. • Information is stored in “blocks” of data that are passed around. (Distributed) • Most implementations use some sort of hashing to insure the integrity of blocks. (Immutable) • Each block includes the hash of the previous block- hence the term “block chain” • Various protocols are used to distribute updates across all computers. • The computers then verify and agree on legitimate transactions to add to the next block. • In order to get them to cooperate to do the work, some sort of reward must be offered. • One of the first useful implementations of the concept was “Bitcoin”. Blockchain technology (Generic view)
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 In 2009, someone using the name Satoshi Nakamoto wrote a white paper outlining a scheme to use Blockchain technology as a new form of public “cryptocurrency”. • Bitcoin uses “proof of work” to award new Bitcoins to computers who build and verify the blocks. • Because new coins come into existence as rewards, they are called “miners”. • The rewards get smaller over time, while the difficulty of the work increases. This helps make bitcoins more valuable and scale. • There can only be a maximum of 21 Million Bitcoins ever created. As of January 2018, about 16.7 million have been mined (released). • A user can create a “wallet” to hold coins. The public address is used to receive money, but a private (secret) key is required to send money. Bitcoin By Zhitelew - Own work, CC0, https://commons.wikimedia.org/w/index.php?curid=40617621 Bitcoin Transactions per month Is it money? IF a buyer and a seller agree, then it is. Rational actors will only hold a commodity if they believe it will hold value and can be traded to someone else later. A student showed his Bitcoin public address on ESPN…and collected over $20K
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 SHA-256 is one of a family of mathematical algorithms that produce a unique digital signature for any data input into the calculation. • The hash is “computationally difficult” to compute, but easy to verify. • No matter how many bits in the source file, the output is always 256 bits. (It is recursive.) • It is impossible to predict what a hash will be for a given block of data without actually doing all of the calculation (no short cuts or estimates). What is a the SHA-256 Hash? "Hello, world!0" => 1312af178c253f84028d480a6adc1e25e81caa44c749ec81976192e2ec934c64 "Hello, world!1" => e9afc424b79e4f6ab42d99c81156d3a17228d6e1eef4139be78e948a9332a7d8 "Hello, world!2" => ae37343a357a8297591625e7134cbea22f5928be8ca2a32aa475cf05fd4266b7 ... "Hello, world!4248" => 6e110d98b388e77e9c6f042ac6b497cec46660deef75a55ebc7cfdf65cc0b965 "Hello, world!4249" => c004190b822f1669cac8dc37e761cb73652e7832fb814565702245cf26ebb9e6 "Hello, world!4250" => 0000c3af42fc31103f1fdc0151fa747ff87349a4714df7cc52ea464e12dcd4e9 Examples of hashes: (we typically don’t show 1’s and 0’s. So, 64 characters x 8 bits = 256 bits) • Note that changing a single bit changes the entire hash, and it’s completely unpredictable (Avalanche effect). • If you want 4 leading zeros, you would have to test 4,250 additional numbers until you found a hash that works.
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Mining is a reward system based on proof of work. • Bitcoin uses the SHA-256 Hash algorithm to create a unique digital signature (hash) for each block. • Bitcoin adds difficulty by requiring that the computer add a random number (called a “nonce”) to the block with the goal of getting the final hash to have some number of leading zeros. (Yes, it’s a bit arbitrary, but it works.) • The first miner to find a nonce that returns the correct number of leading zeros (currently 18) wins some Bitcoins (currently 12.5). That block and hash are then distributed. • The Bitcoin network mines a new block about every 10 minutes. What is bitcoin “mining”? Home ASIC miner: Antminer U3 with a Raspberry Pi acting as a supervisor. This rig calculates 50 GH/s (50 billion hashes per second) in the “Bitminter” pool. After electricity costs, it makes a profit of about 17 cents per week. (January 2018). Sigh. Bitminter Pool dashboard
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 In addition to Bitcoin, there are hundreds of competing cryptocurrency coins emerging. Most will fail. Other Cryptocurrencies Coinmarketcap.com currently tracks about 1422 different crypto coins.
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Blockchain and Cryptocurrencies use cybersecurity technologies: • encryption • hashing There is ongoing development to use blockchain to benefit cybersecurity: • Enhanced data availability (storage) • Certificate management (Guardtime) • Identification management (REMME) • Trusted DNS (to prevent DDoS) What about Cybersecurity?
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 The Dark Side of Cryptocurrencies Anonymity supports illegal transactions: • Ransomware payments • Dark web transactions
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 There have been some high profile cryptocurrency hacks: • Mt. Gox • In June of 2011, a hacker broke in, transferred and then sold bitcoin. Losses were about $8,750,000. • In February of 2014, transaction malleability attack forced Mt. Gox to declare bankruptcy. • Ethereum DAO attack • In June of 2016, someone manipulated a contract programming loophole and stole about a third of all Ether coins before the leak was detected. (~$50M dollars). It caused Ethereum to split into “Ethereum Classic(ETC)” and Ethereum(ETH). • Bitfinex attack • In August of 2016, the Hong Kong based exchange was attacked and about $72M in Bitcoins was stolen. • NiceHash attack • In December of 2017, the Slovenian bitcoin mining was hacked and about $80M in Bitcoins were stolen. What about the bad guys? Never the less, cryptocurrencies continue to move forward.
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Mining software that runs as Javascript in the browser. A link to the software can be included in any web page. When you go to that web page, they can cause your computer to start mining cryptocurrency for them. Top 3 cryptojacking companies: • Coinhive • JSEcoin • Cryptoloot The companies split the profits with the web page owner. These products are legal, and being offered as a substitute for advertising revenue. However, the web site owners don’t have to tell the users. The next trend: Cryptojacking These miners typically mine Monero coins, because Bitcoin difficulty is too high.
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Coinhive pays out about 0.00015 XMR (Monero) per 1 million hashes. Data: A typical laptop computer can do about 30 H/s Cryptojacking by the numbers Advertising model 1000 users per day 1% click through ratio, payment $0.50 per click Total: 10 clicks per day Total daily revenue: $5.00 per day Cryptojacking model 1000 users per day 30 H/s, 5 minute visit = 9000 H/user Total hashes = 9 million hashes per day Total daily revenue: $0.51 So, if Advertising pays 10 times better than Cryptojacking, why is Cryptojacking “a thing”? If a website can be hacked, the hacker can add the cryptojacking code and collect the reward for himself. The website owner would not even know.
  • 15. © Global Knowledge Training LLC. All rights reserved. Page 15 Coinhive has been injected into many sites. Hacked Websites https://shop.subaru.com.au/ Note: The actual browser code can be easily viewed and analyzed. A unique Coinhive ID is included so that the hacker can be paid. Over 85% of them in the wild go back to the same 2 Coinhive accounts (IDs).
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Some downloadable apps contain hidden mining software. They can: • Slow down your cellphone • Use up your battery Some have been known to physically damage the phone by draining the battery too quickly, causing it to overheat and swell. Mobile risks Loapi Malware on Android
  • 17. © Global Knowledge Training LLC. All rights reserved. Page 17 Defenseᵌ: Human Element and 3D Defense PROCESS PEOPLE TECHNOLOGY More than “Defense in depth,” organizations need Defenseᵌ because cyber attacks happen across three dimensions. Cyber attacks are people attacking people, not machines attacking machines, so an educated workforce is critical.
  • 18. © Global Knowledge Training LLC. All rights reserved. Page 18 Install anti-cryptojacking plug-ins in Chrome. Many Ad-blockers are starting pick them up as well. Redirect: add 127.0.0.1 coin-hive.com coinhive.com to your hosts file. Use a trusted DNS service. Examples:  Google: 8.8.8.8, 8.8.4.4  OpenDNS: 208.67.229.220, 208.67.222.222  DNSWatch: 84.200.69.80, 84.200.70.40  Norton Connectsafe: 199.85.126.10, 199.85.127.10  Comodo Secure: 8.26.56.26, 8.20.247.20 If the computer slows down, check the process manager to see if the browser is using up too many resources. What should you do? Note: Some cryptojackers are using “pop-under” techniques to hide the running code (often under the bottom task bar) You may have to reboot. Traffic to/from the miner is typically encrypted in TLS, and looks like normal port 80 web traffic. It’s difficult to detect on the network.
  • 19. © Global Knowledge Training LLC. All rights reserved. Page 19 Take That Next Step in your Cybersecurity Career Foundational Courses: Cybersecurity Foundations Fundamentals of IS Security Certification Courses: CompTIA, (ISC)2, ISACA, IAPP, EC-Council, Product Courses: Cisco, IBM, SonicWall, F5, Dell, Palo Alto
  • 20. © Global Knowledge Training LLC. All rights reserved. Page 20 Learning More www.globalknowledge.com For additional resources, visit us at…

Editor's Notes

  • #3: Dave is the Global Senior Portfolio Director for Cybersecurity at Global Knowledge & has over 35 years of experience as a technologist in engineering & holds Security+ & CISSP certifications. Ross Casanova, also 35+ years aof experience in both cybersecurity engineering roles as well as roles such as instructional design and training program management with firms such as SANS, the SEC & CSRA.