Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers
The Last Watchdog
AUGUST 3, 2018
Illicit crypto mining is advancing apace. It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. Related article: Illicit crypto mining hits cloud services. LW: What’s going on in the wild that illustrates this trend? Cryptojacking was born.
Let's personalize your content