As cloud computing has become more pervasive, so have cryptomining attacks. The evolution of IT infrastructure has led to an increase in attack surface, creating the perfect environment for cryptojackers to strike. Cryptojackers can easily profit by distributing cryptominers through malicious images.
Once a breach takes place, the cloud’s complex, ever-changing nature means that it’s easy for cryptominers to lurk undetected for considerable lengths of time. The longer a bad actor remains undiscovered, the more cryptocurrency they can mine and the more money they can rake in.