Renato Marinho, CISSP, GCFA, CRISC, LPIC2, PMP
Chief Research Officer
Morphus Labs

Stealing CPU: 2018’s cybercriminals gold rush

Why crypto jacking became so prevalent? How long does it take to have crypto miner malicious campaigns opportunistically exploiting new vulnerabilities? How profitable are they? Those are some of the questions we answered while responding to three remarkable crypto mining incidents targeting WebLogic, Apache SOLR and Drupal critical vulnerabilities we are going to present in this session.


Learning objectives:
1. Better understand how malicious crypto miners work.
2. Identify crypto jacking indicators of compromise on his environment.
3. Learn how to prevent this type of threat in their environment.