Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Using ML to cope with cryptojacking attempts

byKerem Gülen
August 11, 2022
in News, Artificial Intelligence, Cybersecurity, FinTech
Home News

Cryptojacking is the illegal use of another person’s computing power to mine cryptocurrencies. One of the most crucial skills a security team may possess is the capacity to identify dangers and take action as soon as possible. The level of disruption and operational effect will be reduced the quicker they can react to a data breach.

This is more easily said than done, which is the issue. When using manual administrative methods, it might be quite difficult to detect harmful behavior in the environment and start a response.

However, the detection and response efforts of an organization may be accelerated by technologies like artificial intelligence (AI) and machine learning.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Machine learning can be used to quickly identify and address cryptojacking attacks.
Cryptojacking is the illegal use of another person’s computing power to mine cryptocurrencies

Sysdig, a supplier of a unified container and cloud security, today at the Black Hat Conference announced the release of a new machine learning-driven cloud detection and response (CDR) solution to counter attempts at cryptojacking.

According to Sysdig’s statement, machine learning is a crucial technology that businesses and other decision-makers may use to scale up their efforts to find and fix vulnerabilities.

Dealing with cryptojacking 

The amount of malicious crypto mining attacks increased by 30% to 66.7 million between January and June, according to the 2022 SonicWall Cyber Threat Report, even though the cryptocurrency market has taken some substantial hits in recent months.

Cybercriminals will try to leverage a target’s computing resources to mine cryptocurrencies while staying undiscovered for as long as feasible. This offers unique issues for enterprise security teams. The financial gain of the attack increases with the length of time they go unnoticed.

In decentralized cloud environments, despite these efforts to escape discovery, technologies like machine learning have the ability to identify and address cryptojacking attacks quickly.

Machine learning can be used to quickly identify and address cryptojacking attacks.
Technologies like machine learning have the ability to identify and address cryptojacking attacks quickly

“Sysdig gives real-time visibility at scale to address risk across containers and multiple clouds, eliminating security blind spots. We use context to prioritize security alerts so teams can focus on high-impact security events and improve efficiency. By understanding the entire source to runtime flow and suggesting guided remediation, we shorten time to resolution,” stated senior product marketing manager at Sysdig, Daniella Pontes. 

In essence, Sysdig’s ML-powered solution helps security teams to find and prioritize fixing software anomalies and vulnerabilities before it’s too late.


Security as a service leaves cybersecurity to the experts, but it is a double-edged sword


The solution operates with deep container visibility, the ability to examine process activity and other system behaviors, and a specialized ML model specifically trained to recognize crypto miner behavior running in containers.

The company claims that this strategy is so successful that 99% of the time, its threat engine and detection algorithms successfully prevent efforts at cryptojacking.

How does the cloud security posture management market look?

In the cloud security posture management (CSPM) market, which analysts predict will expand from a value of $4.2 billion in 2022 to a total of $8.6 billion by 2027, Sysdig is one of the biggest competitors.

CrowdStrike is one of Sysdig’s main marketplace rivals. With integrated threat intelligence, its Falcon Horizon solution can automatically discover cloud-native assets and identify configuration errors, security vulnerabilities, and security threats.

Machine learning can be used to quickly identify and address cryptojacking attacks.
Sysdig threat engine and detection algorithms successfully prevent efforts at cryptojacking

With InsightCloudSec, Sysdig competes against companies like Rapid7. This solution provides real-time analysis and automation capabilities to help security teams safeguard workloads during runtime with vulnerability assessments and automated remediation to eliminate misconfigurations and vulnerabilities.


Rising cybersecurity risks threaten the healthcare industry


The fact that Sysdig is shifting away from utilizing machine learning for more general anomaly detection and toward using it for more specialized objectives or use cases, such as identifying crypto mining, is one of the fundamental distinctions between Sysdig and other providers, according to Pontes.

“Our solution is based on an ML model trained to recognize the anatomy of crypto miners from the processing activity in running containers. We use our deep visibility into containers at runtime to collect the necessary type of data to identify crypto miners’ behavior,” Pontes explained.

Tags: cryptoCryptocurrencyCybersecurityfintechMining

Related Posts

UK Home Office seeks full Apple iCloud data access

UK Home Office seeks full Apple iCloud data access

September 2, 2025
iPhone 17 may drop physical SIM in EU

iPhone 17 may drop physical SIM in EU

September 2, 2025
Zscaler: Salesloft Drift breach exposed customer data

Zscaler: Salesloft Drift breach exposed customer data

September 2, 2025
AI boosts developer productivity, human oversight still needed

AI boosts developer productivity, human oversight still needed

September 2, 2025
Windows 11 25H2 enters testing with no new features

Windows 11 25H2 enters testing with no new features

September 2, 2025
ChatGPT logo fixes drive demand for graphic designers

ChatGPT logo fixes drive demand for graphic designers

September 2, 2025
Please login to join discussion

LATEST NEWS

UK Home Office seeks full Apple iCloud data access

iPhone 17 may drop physical SIM in EU

Zscaler: Salesloft Drift breach exposed customer data

AI boosts developer productivity, human oversight still needed

Windows 11 25H2 enters testing with no new features

ChatGPT logo fixes drive demand for graphic designers

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.