In March 2018, NTT Security released a report detailing exclusive insight into our research and analysis regarding unauthorized cryptomining. The report focused heavily on Monero (XMR) miners, hunting them down, and detections analyzed from our detection data.
Since the release of this report, growth and usage of cryptominers has not slowed down, with Comodo security quoting 28.9 million cryptominer incidents in quarter one of 2018. NTT Security’s researchers have continued to monitor, track and analyze malicious cryptomining campaigns and malware, as well as blockchain landscapes. Over time, our researchers have shared their knowledge and insight with the community through the following publishings:
Joining Others With Similar Interests
Where might the next research initiative and publication come from you might ask? Without a doubt, it is a more collaborative approach to not only combatting cryptominers but cyber threats in general through co-operative cyber intelligence sharing and research collaboration. At NTT Security, we understand the need for cooperation to defend our clients and partners. We recently joined the Cyber Threat Alliance (CTA), a not-for-profit consortium of security industry players committed to sharing actionable and high-quality global threat intelligence in near real time to improve the cybersecurity of our global digital ecosystem.
CTA is the industry’s first formally organized group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries. As a member of the CTA, we will regularly work with other leading security companies to share actionable threat intelligence at speed and scale to collaboratively disrupt malicious cyber activity globally.
In May 2018, NTT Security researchers became part of a special sub-committee meant to analyse and address the cryptojacking threat landscape both technically and strategically. The sub-committee consists of cryptojacking niched analysts from several cybersecurity companies. The report is a treasure-trove of insight into the cryptojacking landscape as of recent covering everything from blockchain technology, impacts of cryptomining, predicted evolution, best practices for combatting, and more.
Companies continue to struggle to recognize what actions they should take to address the evolving cyber threat landscape. To address today’s threat landscape, we understand that there is value in collaboration and strength in numbers. To maximize our strengths and minimize our risks, we must understand that intelligence comes from within the network as well as outside it. Good information allows for earlier identification and faster response to cyber attacks, monitoring for rogue activity inside, as well as undetected external attacks. Our joining of the CTA and collaboration efforts into this report showcase not only impeccable insight into the cryptojacking threat landscape and more, but also how well professionals can nicely play together.
The official report by CTA can be found here, and is a great go-to report about the cryptojacking threat landscape.