Search
This page's url is: -Closeup CRN- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Newsroom Dell EMC Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM PartnerWorld Newsroom Lenovo Newsroom Nutanix Newsroom HPE Zone Tech Provider Zone

The Top 10 Cyberthreats Right Now

CRN asks technical leaders at Cisco, FireEye and LogPoint what the most pernicious cyberthreats are today and what organizations need to do to avoid becoming a victim.

Back 1   2   3   ... 11 Next
photo

Cryptomining

Organizations that fall prey to cryptomining probably left a door open somewhere, raising questions as to what else is in their network, according to Cisco's Williams.

Known, longstanding exploit kits are typically used to carry out cryptomining, Williams said, meaning that businesses that succumb to it have usually had unsecured systems present for a long time. Cryptomining is orders of magnitude more prevalent today than any other type of attack, Williams said, since it can persist for an incredibly long period of time and is nearly risk-free for attackers.

Unlike ransomware—which has a payout rate of between 1 percent and 2 percent—attackers that successfully carry out cryptomining get paid 100 percent of the time, Williams said. Rather than taking the ransomware approach of trying to get an organization to pay a large sum to regain access to a single machine, Williams said cryptomining brings in smaller amounts of money from many, many machines.

 
 
Back 1   2   3   ... 11 Next

sponsored resources