• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Beware those spikes in your cloud bills

Allan Tan by Allan Tan
January 25, 2021
Image from Sophos

Image from Sophos

SETI@home was launched on May 17, 1999, to help search for extra-terrestrial – that’s right: ET – by using the CPU of idle computers connected to the internet to perform data analysis. A few other projects used the same concept: Great Internet Mersenne Prime Search to search for prime numbers or a number one less than a power of two; Einstein@Home to search for signals from rotating neutron stars and to generate accurate three-dimensional dynamic models of stellar streams in the immediate vicinity of the Milky Way.

Yes, at a very young age I was in love with astronomy (not so much with maths though).

But like many good ideas, the concept can be turned for nefarious purposes.

Crytojacking and why IT should be concerned

Cryptojacking is one such abuse of a good idea. Investopedia defines cryptojacking as a form of cyberattack in which a hacker hijacks a target's processing power to mine cryptocurrency on the hacker's behalf.

Why cryotojacking? Cryptocurrency mining (cryptomining) is a very energy-intensive process with some estimates putting the figure at 67 terawatts hours per year.

Cryptojacking targets vulnerabilities in Windows and in applications that run on server hardware, for example, databases. Cloud providers in particular present a juicy target but the direct victims are applications running in the cloud meaning your ERP, CRM or any application that has a database. Yes, the onus should be on operators of these cloud services to prevent cryptojacking but you may want to check the fine print in your service contracts. Otherwise, you could end up paying for compute resources you never used in the first place. [see attack timeline below for how this happens]

MrbMiner et al

The developers of MrbMiner target internet-facing database servers (SQL servers) because these servers as designed for compute-intensive applications.

In a time where ransomware attacks have caused multi-million-dollar losses, it can be easy to treat cryptojacking as a nuisance rather than the serious threat that it is. Organisations tend to get complacent where cyptojacking is concerned as it is a silent and invisible threat, but it is important to remember that it is easy to implement and very difficult to detect.

Gabor Szappanos

Gabor Szappanos, threat research director, SophosLabs, warned not to treat cryptojacking less than a cyberattack that it is: “Once a system has been compromised it presents an open door for other threats, such as ransomware. It is therefore important to stop cryptojacking in its tracks. Look out for signs such as a reduction in computer speed and performance, increased electricity use, devices overheating and increased demands on the CPU.”

The top five security attacks of 2019

After all is said and then and you still think cryptojacking is not a concern, checkout the top five security incidents of 2019. See something you recognise?

Key takeway

To stay ahead and remain vigilant, IT managers and individuals should look out for signs such as a reduction in computer speed and performance, increased electricity use, devices overheating and increased demands on the CPU. There are also other business implications like opportunity costs when systems are slow to respond to legitimate demand, security risks, reputational and regulatory costs and ethical concerns.

The Sophos report, Standing Up to Cryptojacking, is an interesting read because it illustrates the ease with which to set yourself up to be a cryptominer, how to make money from cryptomining, and the ways to cryptojacking.

Did you know adblockers may help prevent cryptojacking? Some options to consider in the fight against cryptojacking: block websites hosting JavaScript miners both at the gateway and the endpoints; stop cryptomining malware at all points in the attack chain; and kickout cryptomining apps from your network.

Sophos offers additional suggestions:

  • Keep devices patched
  • Use mobile management technology to identify native mobile apps that shouldn’t be there
  • Educate staff on cryptomining (and how it is something not acceptable to the company)
  • Maintain strong password policy at least until we have a better way of IAM tools
  • Keep watch of tell-tale signs that you have been cryptojacked – slow network, rising electricity bill, or spikes in CPU consumption
Related:  Predictions 2023: IDC FutureScape shows how we are all connected
Tags: cryptojackingcryptominingcybersecuritySophos
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • APAC CIOs rethink cybersecurity investments amid expanding threat landscape
  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe