How Akamai Prevents Coin Mining Malware

GlobalDots
2 Min read

The rise of cryptocurrency value has resulted in malicious actors doing whatever it takes to achieve capital gain. Spreading coin mining malware is one of the ways cybercriminals are trying to gain the system – and your data could be at risk.

Reduce your AWS costs by over 50%

Discover your Cloud Saving Potential – Answer just 5 simple questions. AppsFlyer, Playtika, Lufthansa, IBM, top leading companies are already using our FinOps services.

Reduce your AWS costs 
by over 50%

Cryptocurrency mining refers to the practice of using computer hardware to “mine” cryptucurrency like Bitcoin. It usually requires a lot of processing power, and it uses up large amounts of electricity.

The term “coin mining malware” refersr to malware that malicious actors use to install coin miners onto users’ systems. This enables them to utilize the compromised systems’ computing resources for their own financial gain. Coin-mining malware has had a lot of media coverage in recent months, but it has roots dating back to 2011.

It works by infecting computers and using their processing power to mine cryptocurrency tokens. This means that the infected device/computer slows down to the point where it is unusable.

Akamai, one of the world’s leading CDN providers, has been developing various forms of threat mitigation over the last several years, and has built out an entire threat research team to study the behavior of these hazards, in addition to take an algorithmic approach to identifying the anomalies in behavior for various DNS lookups.

Coin mining malware drop sites domains to Akamai’s threat list and will continue to track new domains as they are uncovered. The intent here is to provide an additional layer of protection against malware such as coin mining.

coin mining malware

Image source

Read more: Akamai Blog

Latest Articles

Cut Big Data Costs by 23%: 7 Key Practices

In this webinar, we reveal a solution that cuts big data costs by 23% and enhances system efficiency - without changing a single line of code. We’ll also explore 7 key practices that will free your engineers to process and analyze data at the pace and scale they need - and ensure they never lose control of the process.

Developer AXE-WEB
15th April, 2024
Project FOCUS: A New Age of FinOps Visibility

It’s easy for managers and team leaders to get caught up in the cultural scrum of FinOps. Hobbling many FinOps projects, however, is a lack of on-the-ground support for the DevOps teams that are having to drive this widespread change – this is how all too many FinOps projects become abandoned on the meeting room […]

Nesh (Steven Puddephatt) Senior Solutions Engineer @ GlobalDots
27th March, 2024
Optimize Your Cloud Spend with a FinOps Maturity Assessment

Achieving FinOps is a tall order: it demands a degree of organizational self-awareness that some companies are constantly battling for. Consider the predicament that many teams find themselves in: while their cloud environments may contain a number of small things that could be optimized, there are no single glaring mistakes that are consuming massive quantities […]

Nesh (Steven Puddephatt) Senior Solutions Engineer @ GlobalDots
27th March, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

Unlock Your Cloud Potential