The "Cryptocurrency Mining" detection focuses on identifying unauthorized use of an organization's computing resources to mine cryptocurrencies. Cryptocurrency mining involves using computational power to solve complex mathematical problems, which are then rewarded with cryptocurrency. While mining is a legitimate activity, unauthorized mining on corporate infrastructure can lead to significant resource consumption, increased operational costs, and potential security risks.
Scenario 1: An attacker compromises a server in the organization's network and installs cryptocurrency mining software. The detection is triggered by a sudden spike in CPU usage and outbound traffic to known mining pools.
Scenario 2: An employee installs mining software on their workstation for personal gain. The detection is triggered by increased CPU and GPU usage, along with connections to external mining servers.
If this detection indicates a genuine threat, the organization faces significant risks:
Unauthorized mining consumes computational resources, reducing performance and availability for legitimate business operations.
Higher energy consumption and potential hardware damage due to overheating can lead to increased operational costs.
Mining software can create vulnerabilities or backdoors that attackers can exploit.