Along with ransomware, cryptocurrency mining malware is one of the most common threats to enterprise systems. Just like with ransomware, the sophistication of cryptominers has grown over the years, incorporating attack vectors and techniques such as fileless execution, run-time compilation and reflective code injection that were once associated with advanced persistent threats (APTs).
[ How well do you know these 9 types of malware and how to recognize them. | Sign up for CSO newsletters! ]
To read this article in full, please click here
Support the originator by clicking the read the rest link below.