Skip to content

Exabeam Appoints Pete Harteveld as CEO — Read More

The Anatomy of Shadow Mining

Report

How malicious insiders abuse IT rights to mine cryptocurrency, how is it done, and what organizations can do to protect themselves.

Mining cryptocurrency has the potential to be very profitable, but it requires a vast number of high-speed computations run by powerful systems that often need significant amounts of electricity. Because of these infrastructure and energy requirements, malicious insiders have devised various schemes to compromise the IT resources of their organizations, covertly using them for illicit cryptocurrency mining. We call these illicit cryptomining activities “shadow mining.”

Another potential risk is that a hacker may compromise a privileged user and perform the same activity from outside the organization. Not only does shadow mining consume resources and increase utility bills, it also affects the security of an organization’s IT infrastructure.

Read this report about the hidden world of cryptocurrency mining and how malicious insiders can abuse their IT rights to mine cryptocurrency within their own organization.

In this report you will learn:

  • The different methods for cryptocurrency mining
  • What is shadow mining and why is it a security threat?
  • What are the risks and impacts on an organization when there is shadow mining?
  • How is it done and what can organizations do to protect themselves?

Get the Report: The Anatomy of Shadow Mining

Complete the form below and submit to download this resource.