1,712
Views
19
CrossRef citations to date
0
Altmetric
Research Article

Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security

ORCID Icon, , &

References

  • Brown SD. Cryptocurrency and criminality: the Bitcoin opportunity. Police J. 2016 Dec;89(4):327–39. doi:10.1177/0032258X16658927.
  • Stroukal D Bitcoin and other cryptocurrency as an instrument of crime in cyberspace. Proceedings of Business and Management Conferences; 2016 Nov; (No. 4407036). International Institute of Social and Economic Sciences.
  • Butavicius M, Parsons K, Pattinson M, McCormac A. Breaching the human firewall: social engineering in phishing and spear-phishing emails. Australasian Conference on Information Systems ACIS'15. Adelaide, Australia. 2015.
  • Dhamija R, Tygar JD, Hearst M Why phishing works. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2006 Apr 22; ACM. p. 581–90.
  • Kruck GP, Kruck SE. Spoofing – a look at an evolving threat. J Comput Inf Syst. 2006 Sep 1;47(1):95–100.
  • Schneier B. Attack trees. Dr. Dobb’s J. 1999 Dec 1;24(12):21–29.
  • Zimba A, Chen H, Wang Z. Bayesian-Boolean logic security assessment model for malware-free intrusions. Int J Netw Security. in press;20(3):558–67. doi:10.6633/IJNS.201805.20(3).19.
  • Vukolić M. The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security; 2015; Zurich, Switzerland; 2015; Cham: Springer. p. 112–25.
  • Berengueres J. Valuation of crypto-currency mining operations. Ledger Journal. arXiv preprint arXiv:1802.01176. 2018 Feb 4.
  • Stokel-Walker C. Are you making cryptocurrency for crooks? New Sci. in press Jan;237:3161 . pp.16. doi:10.1016/S0262-4079(18)30115-5.
  • The Sun. Illegal Bitcoin mining factory sparks massive blaze thanks to overheating computers used to create cryptocurrency. in press Feb 9 [accessed 2018 Feb 15]. https://www.thesun.co.uk/news/5538526/bitcoin-mining-factory-cryptocurrency-illegal-russia-fire-overheating-computers/.
  • Sky News. ‘Cryptojacking’ attacks surge 1,200% in UK. in press Feb [accessed 2018 Feb 20]. https://news.sky.com/story/cryptojacking-attacks-surge-1200-in-uk-11269594.
  • Nayak K, Kumar S, Miller A, Shi E Stubborn mining: generalizing selfish mining and combining with an eclipse attack. Security and Privacy (EuroS&P), 2016 IEEE European Symposium; 2016 Mar 21; IEEE. p. 305–20. doi: 10.1109/EuroSP.2016.32.
  • Becker J, Breuker D, Heide T, Holler J, Rauer HP, Böhme R Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. The Economics of Information Security and Privacy; 2013; Springer: Berlin (Heidelberg). p. 135–56.
  • Cova M, Kruegel C, Vigna G Detection and analysis of drive-by-download attacks and malicious JavaScript code. Proceedings of the 19th International Conference on World Wide Web; 2010 Apr 26; ACM; p. 281–90. doi:10.1145/1772690.1772720.
  • Security Intelligence. XMRig: father Zeus of cryptocurrency mining malware? in press Feb [accessed 2018 Feb 26]. https://securityintelligence.com/xmrig-father-zeus-of-cryptocurrency-mining-malware/.
  • Noether S, Noether S Monero is not that mysterious. Technical report. 2014 Sep 25.
  • Mauw S, Oostdijk M Foundations of attack trees. International Conference on Information Security and Cryptology; 2005 Dec 1; Berlin, Heidelberg: Springer. p. 186–98.
  • Khand PA System level security modeling using attack trees. Computer, Control and Communication, 2009. IC4 2009. 2nd Int’l Conference; 2009 Feb 17; IEEE. p. 1–6.
  • Sun Z, Strang KD, Pambel F. Privacy and security in the big data paradigm. J Comput Inf Syst. in press Feb;7:1–0. doi:10.1080/08874417.2017.1418631.
  • Sarraute C, Richarte G, Lucángeli Obes J An algorithm to find optimal attack paths in nondeterministic scenarios. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence; 2011 Oct 21; ACM. p. 71–80. doi:10.1145/2046684.2046695.
  • Arce I, Richarte G State of the art security from an attackers viewpoint. PacSec Conference; 2003; Tokyo, Japan.
  • Wang J, Herath T, Chen R, Vishwanath A, Rao HR. Research article phishing susceptibility: an investigation into the processing of a targeted spear-phishing email. IEEE Trans Prof Commun. 2012 Dec;55(4):345–62. doi:10.1109/TPC.2012.2208392.
  • Zimba A, Wang Z, Chen H Reasoning crypto ransomware infection vectors with Bayesian networks. Intelligence and Security Informatics (ISI), 2017 IEEE International Conference; 2017 Jul 22; IEEE. p. 149–51. doi: 10.1109/ISI.2017.8004894.
  • Jabir RM, Khanji SI, Ahmad LA, Alfandi O, Said H Analysis of cloud computing attacks and countermeasures. Advanced Communication Technology (ICACT), 2016 18th International Conference; 2016 Jan 31; IEEE. p. 117–23. doi: 10.1109/ICACT.2016.7423296.
  • Yoon HS, Occeña LU. Impacts of customers’ perceptions on internet banking use with a smartphone. J Comput Inf Syst. 2014 Mar 1;54(3):1–9. doi:10.1080/08874417.2014.11645699.
  • GitHub. XMRig: the Monero (XMR) CPU miner. (in press) [accessed 2018 Jan 10]. https://github.com/xmrig/xmrig.
  • NiceHash. Largest crypto-mining marketplace. [accessed 2017 Dec 23]. https://www.nicehash.com/.
  • Dev JA Bitcoin mining acceleration and performance quantification. Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference; 2014 May 4; IEEE. p. 1–6. doi: 10.1109/CCECE.2014.6900989.
  • Dwyer A. The NHS cyber-attack: A look at the complex environmental conditions of WannaCry. RAD Magazine 44. Braintree, CM7 4SL, United Kingdom. 2018:25–26.
  • Boudar O Network behavioral analysis for zero-day malware detection–a case study. Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments: First International Conference, ISDDC 2017; 2017 Oct 26–28 Proceedings 2017 Nov 15. Vancouver, BC, Canada: Springer. Vol. 10618, p. 169.
  • Mukhopadhyay U, Skjellum A, Hambolu O, Oakley J, Yu L, Brooks R A brief survey of cryptocurrency systems. Privacy, Security and Trust (PST), 2016 14th Annual Conference; 2016 Dec 12; IEEE. p. 745–52.
  • Kieren M. The Register. CBS’s Showtime caught mining crypto-coins in viewers’ web browsers. 2017 Sep 25 [accessed 2017 Dec 27]. https://www.theregister.co.uk/2017/09/25/showtime_hit_with_coinmining_script/.
  • Segura J A look into the global ‘drive-by cryptocurrency mining’ phenomenon. Malwarebytes Technical Report. 2017 Oct.
  • Jones BH, Heinrichs LR. Do business students practice smartphone security? J Comput Inf Syst. 2012 Dec 1;53(2):22–30. doi:10.1080/08874417.2016.1164007.
  • Harris MA, Patten KP. Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management & Computer Security. 2014 Mar 4;22(1):97–114. doi:10.1108/IMCS-03-2013-0019
  • ESET. Money-making machine: Monero-mining malware. 2017 Sep 28 [accessed 2017 Dec 19]. https://www.welivesecurity.com/2017/09/28/monero-money-mining-malware/.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.