Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive study on cryptojacking campaigns at internet scale in this 21-minute conference talk from USENIX Security '19. Delve into the world of illicit cryptomining, examining its rise since 2017 and the methods criminals use to monetize websites. Learn about the identification of 204 cryptojacking campaigns, significantly more than previously estimated, and discover how third-party software like WordPress has become a primary vector for spreading infections. Gain insights into the popularity of mining applications through NetFlow data analysis, comparing Coinhive's installation base to CoinImp WebSocket proxies' traffic volume. Understand the prevalence of cryptojacking across the internet, with findings from a crawl of 49 million domains, and learn which website categories are most affected. Examine the anatomy of browser-based cryptomining, attack vectors, and methods for distinguishing cryptojacking services. Investigate how infections are linked to campaigns and explore key takeaways from this extensive research.
Syllabus
Intro
Anatomy of Browser-Based Cryptomining
Attack Vectors for Browser-Based Cryptomining
Quantifying the Problem of Cryptojacking
Distinguishing Cryptojacking Services
The most installed mining service is not the most profitable one.
Linking Infections to Campaigns
Example Bitrix24 campaign
Most infections are the result of compromised third-party software.
Key take aways
Additional aspects in the paper
Taught by
USENIX