The hidden side of mining softwares

Instead of creating alternative currencies, cryptomining software could be used for a more sinister attack that could steal corporate secrets, according to Troy Kent, a threat researcher at Awake Security. With this attack, people are using a tool, a crypto miner that they’re used to seeing on their network. But they’re not used to responding to it as though it is a legitimate threat, like a botnet or a Trojan. They can come in and they can steal files, they can steal intellectual property, they can steal credentials and then log in as maybe the CEO. Or they can download more software. They can bring down services.