The New Gold Rush: How to Hack Your Own Best Mining Rig

Posted on in Presentations

2018 is the year of malicious crypto-mining attacks, as threat actors turn from doubtful one-off payment disruption attacks to cryptojacking malware attacks, which almost guarantee a payday, with a negligible chance of being discovered. The new cryptocurrency mining attacks are relatively simple and secretly utilizing the processing power of the victim device to mine for the cryptocurrency.

Learning Objectives:
1: Understand the simplicity of crypto-mining attacks.
2: Learn how to build a decentralized platform dedicated to crypto-mining.
3: Learn about steps to take to protect digital assets and bank accounts.
Roy Katmor


GM, Endpoint Solutions, Fortinet

Udi Yavo


CTO, EndPoint Solutions, Fortinet

Share With Your Community