We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.
The rise of in cryptocurrency values has incentivized hackers to exploit the CPU power of their victims in order for crypto-mining operations. Our research shows that these cryptojacking attacks have reached epidemic proportions.
In our previous post we reviewed how current plague of mining attack is impacting businesses across the globe in three key ways:
- Consumption of precious server resources
- Reduced user productivity
- Negative impact on company reputation and customer satisfaction
With the correct tools and processes in place, organizations can effectively prevent mining attacks.
1. Patch all systems and applications
Patching is always a good practice and can assist in preventing many crypto-mining and other attacks. If you don’t already do so, you should implement solid patching processes across your IT environment.
Unfortunately, achieving 100% real-time patching and hardening of all systems is impractical for most enterprise environments. Furthermore, patching cannot protect from attacks that leverage unknown or zero-day vulnerabilities.
2. Implement virtual patching with IPS
IPS technology provides a layer of virtual patching in front of all your organization’s systems, servers and endpoints. A capable IPS can prevent the vast majority of mining attacks by blocking exploitation attempts of your systems – even if they are not fully patched.
At Check Point we’ve enhanced our market leading IPS with specific crypto-mining protections. These protections give full coverage across all the prevailing techniques which mining attacks use to penetrate servers and systems.