In 2018, ransomware trended downward for the first time in over two years. Cryptocurrency mining, or cryptojacking, began to replace ransomware as a favorite tactic cybercriminals use to infiltrate networks. But what’s driving the shift from ransomware to cryptocurrency mining? Unit 42 explains.
Unit 42 is the global threat intelligence team at Palo Alto Networks and a recognized authority on cyberthreats, frequently sought out by enterprises and government agencies around the world.
Our research focuses on how criminals, spies, terrorists, hacktivists, and military personnel craft attack sequences to accomplish their missions. Unit 42 analysts are experts in threat hunting and collecting unknown threats as well as completely reverse-engineering malware using code analysis. Unit 42 has been internationally recognized for key research on threats and campaigns, including OilRig, Sofacy, KeRanger, Nigerian cybercrime, and cryptocurrency mining malware.
We share our findings freely so defenders everywhere can access world-class threat intelligence. The team regularly disseminates finished intelligence products in the form of white papers, adversary playbooks and blog posts, available at https://unit42.paloaltonetworks.com.
Unit 42 is the global threat intelligence team at Palo Alto Networks and a recognized authority on cyberthreats, frequently sought out by enterprises and government agencies around the world.
Our research focuses on how criminals, spies, terrorists, hacktivists, and military personnel craft attack sequences to accomplish their missions. Unit 42 analysts are experts in threat hunting and collecting unknown threats as well as completely reverse-engineering malware using code analysis. Unit 42 has been internationally recognized for key research on threats and campaigns, including OilRig, Sofacy, KeRanger, Nigerian cybercrime, and cryptocurrency mining malware.
We share our findings freely so defenders everywhere can access world-class threat intelligence. The team regularly disseminates finished intelligence products in the form of white papers, adversary playbooks and blog posts, available at https://unit42.paloaltonetworks.com.
- Category
- Palo Alto Networks
- Tags
- cryptocurrency, cryptocurrency threat, cryptocurrency mining
Be the first to comment