Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical SecuritySecurity & Business Resilience

The cloud: A cryptojacker’s playground

By Kate MacLean
rows of binary code in blue and purple

Image via Pixabay

January 12, 2023

As cloud computing has become more pervasive, so have cryptomining attacks. The evolution of IT infrastructure has led to an increase in attack surface, creating the perfect environment for cryptojackers to strike. Cryptojackers can easily profit by distributing cryptominers through malicious images.

Once a breach takes place, the cloud’s complex, ever-changing nature means that it’s easy for cryptominers to lurk undetected for considerable lengths of time. The longer a bad actor remains undiscovered, the more cryptocurrency they can mine and the more money they can rake in.

Successful attacks can lead to severe security issues with long-lasting implications, beyond computing resource theft. Bad actors have been known to deploy other forms of malware alongside cryptominers, using compromised systems in distributed denial of service (DDoS) attacks.

While organizations may treat cryptojacking attempts as a mere inconvenience, they should be treated as a serious threat. As cyber initiatives, such as the advent of the metaverse and the incorporation of cryptocurrency into more business practices, expand across the U.S., cryptocurrency security needs to be a top cyber priority.

Cryptojackers present numerous threats to organizations. For one, organizational leadership should be concerned about the incredible speed with which cryptominers act. Once a cryptojacker gains access to an environment, they can get right to work. Per the November 2021 Threat Horizons report, it takes an average of just 22 seconds for an attacker to download cryptomining software to the user’s resources.

Moreover, the effects of a cryptomining attack can linger far beyond the initial point of compromise. After accessing a user’s cloud data and infrastructure, a cryptojacker can target it with increasingly sophisticated attacks.

Meanwhile, victims find their computers growing painfully slow as their cloud usage costs skyrocket. Couple that with the probability that the bad actor has co-deployed their cryptomining malware with additional malicious tooling, and organizations have a huge security problem.

Luckily, while the cloud may have accelerated this issue, the right cloud security approach can drastically reduce the risk.

Finding cryptominers through behavior-based threat detection

The key to protecting organizations from malicious cryptominers is a proactive, automated approach to threat detection. Automation can help prevent cryptojacking because cloud complexity makes manual intervention difficult.

This type of approach is helpful for many modern cyberattacks like cryptojacking and data exfiltration. Unlike a cyberattack such as ransomware, these new threats aren’t interested in quickly locking up organizational systems and then broadcasting their presence. Instead, they are content to do damage over the long haul, hiding beneath the noise of the cloud environment.

Security teams should consider a time-series model approach to detecting crypto threats due to the complicated threat landscape facing the currency technology. This cloud security approach uses automated learning and behavioral analytics to first build a baseline of expected activity volume and frequency over time within a cloud environment. Once that baseline has been built, the technology monitors for activity spikes that deviate from that unique baseline to detect potential threats. The time series model can scan cloud logs for heightened CPU or GPU usage that accompanies cryptomining operations. It can also detect changes in the volume and frequency of authentication and authorization requests.

Cryptojacking defense for the present and the future

No matter where the cryptocurrency industry heads next, the cloud’s complexity and wide attack surface mean that cryptojacking may remain a major issue for cloud users across a range of industries.

To stay one step ahead of cryptominers, it’s critical to monitor organizational cloud environments for notable changes to new and existing entities. With an approach to threat detection that incorporates time-based automation, tracking malicious activity can become simpler for organizational cybersecurity teams.

KEYWORDS: cloud security cryptocurrency cyber security threat data breach hacking monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kate MacLean is Senior Director of Product Marketing at Lacework.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-and-tablet.jpg

    The 5 most important aspects of a comprehensive cloud security program

    See More
  • Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

    See More
  • supply-chain-sec-freepik1170x658v6.jpg

    Cloud attacks on the supply chain are a huge concern

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing