Insider Threats and the Dangers of Crypto Mining to the Enterprise
Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue, but cyber security experts are concerned with the risk of mining and using internal resources on the local network. In addition to insider threats, hackers have turned to embedded malware on malicious websites to steal resources from a viewer’s computer and use them to mine cryptocurrency.
With the boom in bitcoin prices, mining cryptocurrency has been a way for end users to build wealth. It’s unregulated and volatile, but early miners have made millions after the increased price in bitcoin. Many of them have moved their investments into other cryptocurrency such as Ethereum, Litecoin or Monero.
The type of coin a user mines doesn’t matter, but the resources needed to mine crypto put a strain on the local network. Mining cryptocurrency takes more electricity than usual, so you might see utility costs increase when users are mining cryptocurrency on the network. This is because mining requires user machines to use CPU and memory resources to perform calculations. When the machine successfully performs a calculation, a crypto is produced. The amount of money the user makes depends on the cryptocurrency mined and the value of that cryptocurrency.
The change in electricity usage is astronomical, so don’t disregard the changes in what you could see as a very high utilities bill. For the average gamer, playing 8 hours of games consumes about 2,000 kW/h per year of electricity. With mining cryptocurrency, the same person using a computer for 8 hours a day could use up to 5,000 kW/h each year. These figures only reflect one computer in use, but many users will add several systems to their mining operation. If an insider has access to servers or more powerful machines on the network, this would be primary targets but would greatly increase utility costs and slow network productivity.
Hackers and Crypto Exchanges
Another issue with cryptocurrency in the enterprise is the exchanges where users buy and sell on the market. These exchanges are built by developers that don’t always think like an attacker, and they’ve been hacked to steal money and private data from end users. Some attacks have destroyed the exchange and caused it to fold. Other attacks are from the exchange owner such as Dogecoin where money was withdrawn and one person runs off with all of the crypto money.
For the enterprise, having users work with exchanges while on the network could be the loss of data and possibly even credentials. Cryptocurrency miners with malicious sites normally just work with code that steals computer resources, but exchange hackers are targeting theft of coin and real money.
Defending Corporate Networks from Cryptocurrency Mining
The first step is to create a policy around mining and why it’s a violation to use work computers for mining cryptocurrency. Some antivirus software has become better equipped to identify mining hacks on malicious pages, but these applications are still not to a good point where they fully defend against all of the attacks in the wild.
Filtering sites that are known to contain malware is another option. Some companies rely on a myriad of filters and flagged sites to avoid having users browse them. These work well too and can stop the problem before users are able to see spikes in computer resource usage.
For more information about insider threats and what you can do to defend your network, check out GateKeeper.
See GateKeeper proximity access control in action.
Take a self-guided tour of how your proximity-based access control can work.