Resource Utilization

Cryptocurrency Mining

Cryptocurrency Mining

Detection overview

The "Cryptocurrency Mining" detection focuses on identifying unauthorized use of an organization's computing resources to mine cryptocurrencies. Cryptocurrency mining involves using computational power to solve complex mathematical problems, which are then rewarded with cryptocurrency. While mining is a legitimate activity, unauthorized mining on corporate infrastructure can lead to significant resource consumption, increased operational costs, and potential security risks.

Triggers

  • An internal host is mining units of cryptocurrency of which Bitcoin, Litecoin, Ethereum, and Monero are some of the most common variants
  • Cryptocurrency mining is a common way for botnet operators to make money
  • Cryptocurrency mining may involve communication via HTTP or via the Stratum mining protocol

Possible Root Causes

  • An infected host is mining cryptocurrency for its bot herder
  • Some cryptocurrency mining can occur in the user’s browser as a side effect of visiting compromised or low-reputation websites
  • The user of the host on which the behavior has been detected has installed cryptocurrency mining software and is making money using your organization’s systems, power, and network resources

Business Impact

  • Botnet activity presents several risks to the organization: (1) it creates noise which may hide more serious issues; (2) there is a chance your organization’s IP will end up on black lists; and (3) the compromised host can always be instructed to perform a direct attack on the organization
  • If the user of the host intentionally installed cryptocurrency mining software, the risk may be minimal, though such a user may also be prone to installing other “money making” software which may not prove to be as benign

Steps to Verify

  • If the user intentionally installed cryptocurrency mining software, decide whether it should be removed
  • If the user did not install cryptocurrency mining software, the host is likely infected and part of a botnet that performs “silent mining”
  • Use anti-virus software or reimage the host to remove the malware
Cryptocurrency Mining

Possible root causes

Malicious Detection

  • An attacker has compromised an internal system and is using it to mine cryptocurrencies.
  • Insider threat where an employee intentionally installs mining software on corporate infrastructure for personal gain.
  • Use of malware or Trojans specifically designed to deploy mining software covertly.

Benign Detection

  • Legitimate use of mining software for research or testing purposes within an approved scope.
  • Misconfigured or unauthorized installations of mining software by well-intentioned employees.
  • Security assessments or penetration tests involving mining software.
Cryptocurrency Mining

Example scenarios

Scenario 1: An attacker compromises a server in the organization's network and installs cryptocurrency mining software. The detection is triggered by a sudden spike in CPU usage and outbound traffic to known mining pools.

Scenario 2: An employee installs mining software on their workstation for personal gain. The detection is triggered by increased CPU and GPU usage, along with connections to external mining servers.

Cryptocurrency Mining

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Resource Drain

Unauthorized mining consumes computational resources, reducing performance and availability for legitimate business operations.

Increased Costs

Higher energy consumption and potential hardware damage due to overheating can lead to increased operational costs.

Security Risks

Mining software can create vulnerabilities or backdoors that attackers can exploit.

Cryptocurrency Mining

Steps to investigate

Cryptocurrency Mining

MITRE ATT&CK techniques covered

Cryptocurrency Mining

Related detections

FAQs

What is cryptocurrency mining?

How can I detect unauthorized cryptocurrency mining in my environment?

What are the common signs of unauthorized mining?

Why is unauthorized mining a significant threat?

Can legitimate activities trigger the detection of mining?

What steps should I take if I detect unauthorized mining?

How does Vectra AI detect cryptocurrency mining?

What tools can help verify the presence of unauthorized mining?

What is the business impact of unauthorized cryptocurrency mining?

How can I prevent unauthorized cryptocurrency mining?