Botnets for Mining Cryptocurrencies - Renita Murimi
Offered By: CAE in Cybersecurity Community via YouTube
Course Description
Overview
Explore the threats botnets pose to cryptocurrency mining in this comprehensive talk. Delve into the history of botnet-inspired threats, operational mechanisms, and significant botnets that have attacked cryptocurrencies. Examine the rising popularity of cryptocurrencies, botnet core structures, and push-pull frameworks. Understand the appeal of botnets for cryptomining, various types of botnet-based mining activities, and consensus protocols. Investigate mining environments, browser evolution, and the role of HTML5 and Cross Origin Resource Sharing (CORS) in facilitating cryptomining. Learn about Coinhive as a legitimate framework for browser-based mining and the issues surrounding cryptojacking. Discover how botnets target cryptocurrency theft, clipboard hijacking, mobile apps, and websites. Analyze the ZeroAccess Botnet and explore secure web development frameworks. Gain insights into novel approaches, countermeasures, and future directions for growing cryptocurrency usage and security.
Syllabus
Intro
Rising popularity
Botnet core
Push and pull frameworks
The appeal of botnets for cryptomining
Types of botnet-based mining activity
Consensus protocol
Mining environment
Browser evolution - HTML, CSS, JavaScript, HTML5
Cross Origin Resource Sharing (CORS)
How does that help cryptomining?
Other factors that aid cryptomining
Coinhive - legitimate framework for browser-based mining
Issues with cryptojacking
Cryptocurrency theft
Clipboard Hijacking
ZeroAccess Botnet
Botnets Targeting Mobile Apps
Botnets Targeting Websites
Secure Web Development Frameworks
Novel approach
Future Directions
Taught by
CAE in Cybersecurity Community
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network