Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware. Especially with ready-to-use mining scripts easily provided by service providers (e.g., Coinhive) and untraceable cryptocurrencies (e.g., Monero), cryptojacking malware has become an indispensable tool for attackers. Indeed, the banking industry, major commercial websites, government and military servers (e.g., US Dept. of Defense), online video sharing platforms (e.g., Youtube), gaming platforms (e.g., Nintendo), critical infrastructure resources (e.g., routers), and even recently widely popular remote video conferencing/meeting programs (e.g., Zoom during the Covid-19 pandemic) have all been the victims of powerful cryptojacking malware campaigns. Nonetheless, existing detection methods such as browser extensions that protect users with blacklist methods or antivirus programs with different analysis methods can only provide a partial panacea to this emerging cryptojacking issue as the attackers can easily bypass them by using obfuscation techniques or changing their domains or scripts frequently. Therefore, many studies in the literature proposed cryptojacking malware detection methods using various dynamic/behavioral features.
翻译:新兴的供应链和基于货币的加密技术正在重新定义我们在网络空间中做生意的方式。 今天,众多的连锁和加密货币系统、应用程序和技术已经成为攻击者不可或缺的工具。 事实上,银行业、主要商业网站、政府和军事服务器(例如美国国防部),在线视频共享平台(例如Youtube),游戏平台(例如,Nintendo),关键基础设施资源(例如,路由器),甚至最近广受欢迎的远程视频会议/会议程序(例如,Covid-19大流行时期的缩放),这些系统、应用程序和技术已经成为袭击者不可或缺的工具。 事实上,银行业、主要商业网站、政府和军事服务器(例如,美国国防部),在线视频共享平台(例如,Youtube),游戏平台(例如,Nintendodo),关键基础设施资源(例如,路由路由路由器),甚至最近广受欢迎的远程视频会议/会议/会议程序(例如,Covid-19大流行时期的缩略图),这些工具被银行业、主要商业网站、政府和军事服务器(例如美国国防部国防部)广泛使用的计算工具所实施的自动存储工具,这些工具可以用来作为不断变换的变换的游戏的游戏的游戏分析。