YoVDO

Botnets for Mining Cryptocurrencies - Renita Murimi

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Botnets Courses Cybersecurity Courses Consensus Protocol Courses Cryptocurrency Mining Courses Cross-Origin Resource Sharing (CORS) Courses Cryptojacking Courses

Course Description

Overview

Explore the threats botnets pose to cryptocurrency mining in this comprehensive talk. Delve into the history of botnet-inspired threats, operational mechanisms, and significant botnets that have attacked cryptocurrencies. Examine the rising popularity of cryptocurrencies, botnet core structures, and push-pull frameworks. Understand the appeal of botnets for cryptomining, various types of botnet-based mining activities, and consensus protocols. Investigate mining environments, browser evolution, and the role of HTML5 and Cross Origin Resource Sharing (CORS) in facilitating cryptomining. Learn about Coinhive as a legitimate framework for browser-based mining and the issues surrounding cryptojacking. Discover how botnets target cryptocurrency theft, clipboard hijacking, mobile apps, and websites. Analyze the ZeroAccess Botnet and explore secure web development frameworks. Gain insights into novel approaches, countermeasures, and future directions for growing cryptocurrency usage and security.

Syllabus

Intro
Rising popularity
Botnet core
Push and pull frameworks
The appeal of botnets for cryptomining
Types of botnet-based mining activity
Consensus protocol
Mining environment
Browser evolution - HTML, CSS, JavaScript, HTML5
Cross Origin Resource Sharing (CORS)
How does that help cryptomining?
Other factors that aid cryptomining
Coinhive - legitimate framework for browser-based mining
Issues with cryptojacking
Cryptocurrency theft
Clipboard Hijacking
ZeroAccess Botnet
Botnets Targeting Mobile Apps
Botnets Targeting Websites
Secure Web Development Frameworks
Novel approach
Future Directions


Taught by

CAE in Cybersecurity Community

Related Courses

Azure for Developers: Implementing and Developing Functions
LinkedIn Learning
Configuring CORS in ASP.NET and ASP.NET Core
Pluralsight
Building Microservices with Go
YouTube
Securing and Protecting Your Data in Amazon Simple Storage Service (Amazon S3) (Traditional Chinese)
Amazon Web Services via AWS Skill Builder
Securing and Protecting Your Data in Amazon Simple Storage Service (Amazon S3) (Korean)
Amazon Web Services via AWS Skill Builder