Threat actors will exploit crypto winter for malicious activities

Share post:

The ongoing crypto winter, a market cooling period in the crypto market, is no excuse for crypto marketers to lower their cybersecurity precautions for hackers who use an unsuspecting party’s computer and/or server illegally and unlawfully for crypto scams.

For rightful holders of cryptocurrencies, the losses associated with the crypto winter have been devastating, while crypto winter means slightly less free money for crypto hackers than before.

Cryptojacking affects everyone, but companies that rely heavily on third parties are more vulnerable, and a malicious actor always looks for the weakest link when trying to breach cybersecurity defenses. Third party trust frequently the weakest link.

These third parties may also have direct relationships with other third parties. Because so many companies rely on these interconnected networks of trust, as well as sometimes complex third-party relationship dynamics, weaknesses tend to emerge, making it easier for a crypto hacker to breach cybersecurity defenses.

To avoid these attacks during the crypto winter, cryptocurrency enthusiasts should conduct a risk assessment to identify vulnerabilities. Endpoint safeguards to detect whether a cryptominer is running on an individual or server endpoint should be deployed as soon as the vulnerabilities are discovered that are most likely to be from third parties.

Businesses should also approach third-party relationships with a functional zero-trust policy that includes strong identity verification, extreme password and secret management, and the granting of privileged access only to explicitly authorized users. In addition to zero-trust, organizations can implement systems that restrict user access to systems only when absolutely necessary.

The sources for this piece include an article in TheHackerNews

SUBSCRIBE NOW

Related articles

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Hertz Data Breach Exposes Customer Information via Supply Chain Hack

Hertz has disclosed a data breach resulting from a cyberattack on its vendor, Cleo Communications, which compromised sensitive...

Google’s New Security Feature – Automatic Reboot

Google is introducing a new security feature in its latest Android update that will automatically reboot phones and...

Cybersecurity Firm Prodaft Buys Hacker Forum Accounts to Monitor Cybercriminal Activity

Swiss cybersecurity company Prodaft has initiated a program to purchase verified and aged accounts on hacking forums, aiming...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways