/plushcap/analysis/datadog/cryptomining-detection-rule

Detect cryptocurrency mining in your environment with Datadog Cloud SIEM

What's this blog post about?

Cryptocurrency mining has become an attractive target for cyber threat actors due to its potential profitability and resource-intensive nature. As a result, these attackers are increasingly targeting organizations' cloud resources to mine cryptocurrencies. Datadog Cloud SIEM offers a built-in detection rule that helps monitor cloud-based systems for unwanted crypto mining activity by scanning log data from all your cloud resources for suspicious IP or domain addresses associated with mining servers or pools. Once enabled, the rule generates security signals when flagged IP or domains are detected in logs, providing key insights about affected hosts and processes. This helps organizations investigate further signs of mining activity, identify compromised hosts, mitigate the threat by killing unauthorized processes and adding suspicious IP addresses to firewall deny lists, and fine-tune rules with suppression lists to reduce false positives. Overall, Datadog Cloud SIEM enables quick detection of unwanted crypto mining activity in cloud environments, protecting resources, maintaining performance, and preventing unexpected costs.

Company
Datadog

Date published
April 27, 2022

Author(s)
Mallory Mooney, Dany Kanes, Partha Naidu

Word count
637

Hacker News points
None found.

Language
English


By Matt Makai. 2021-2024.