Is your network safe from cryptominers?
John E. Kaye
- Published
- Home, Technology

Did you realise that your business’s computer resources could be under stealth-attack from cryptominers? Cryptojacking, the hijacking of IT resources to mine cryptocurrencies, is quickly becoming a leading security threat to enterprises. After IT teams leave the office at the end of the day, their powerful computer resources are surreptitiously being used to solve complex algorithms used by blockchain validation mechanisms. These nightly cryptomining raids are racking up huge electricity costs, significantly shortening the lifespan of expensive computer hardware and threatening an organisation’s core business.
The scale of the cryptomining threat is massive and growing, as detailed in the “Allot Telco Security Trends Report”.
The report revealed that in a four month period in late 2017 over seven million end-users across Europe and Israel activated one billion protections against cryptomining malware.
Discover the enemy within
To stay undetected, cryptominers purposefully do not slow down normal business activity. But with the right network visibility tools, performance management, application control and behaviour analysis, IT teams can detect and mitigate cryptomining and other cybersecurity risks.
Our report also highlighted recent cryptojacking attack trends, focusing on databases and application servers. This knowledge allows IT teams to zero-in on off-peak behaviour patterns with tools that detect anomalous network and server activity. Furthermore, with proactive application control, administrators can block malicious sites trying to gain access to servers and quickly shut down risky applications running on their networks.
Shed light on cyber threats by leveraging network visibility
Full network visibility is critical to combat cyber threats. IT teams should consider deploying processes and tools featuring full-packet inspection to uncover anomalous communications and performance management to detect off-peak loads. As previously stated, behaviour analysis software can pinpoint anomalous and potentially costly and unwanted network activity. All of these tools combine to deliver full network visibility.
Combat the threat with Allot Secure Service Gateway
Cryptojackers can’t illegally mine cryptocurrency if they can’t communicate with the enterprise’s servers. By integrating a network monitoring solution, such as the Allot Secure Service Gateway (SSG), IT teams ensure cryptojackers can’t subvert targeted servers to abuse them for cryptomining activity. To proactively repel security threats, enterprises worldwide rely upon Allot’s SSG to provide a single, scalable solution that maximises the visibility, security and control of their networks.
Further information
www.allot.com
RECENT ARTICLES
-
Europe eyes Australia-style social media crackdown for children -
Europe opens NanoIC pilot line to design the computer chips of the 2030s -
Building the materials of tomorrow one atom at a time: fiction or reality? -
Universe ‘should be thicker than this’, say scientists after biggest sky survey ever -
Lasers finally unlock mystery of Charles Darwin’s specimen jars -
Women, science and the price of integrity -
Meet the AI-powered robot that can sort, load and run your laundry on its own -
UK organisations still falling short on GDPR compliance, benchmark report finds -
A practical playbook for securing mission-critical information -
Cracking open the black box: why AI-powered cybersecurity still needs human eyes -
Tech addiction: the hidden cybersecurity threat -
Parliament invites cyber experts to give evidence on new UK cyber security bill -
ISF warns geopolitics will be the defining cybersecurity risk of 2026 -
AI boom triggers new wave of data-centre investment across Europe -
Make boards legally liable for cyber attacks, security chief warns -
AI innovation linked to a shrinking share of income for European workers -
Europe emphasises AI governance as North America moves faster towards autonomy, Digitate research shows -
Surgeons just changed medicine forever using hotel internet connection -
Curium’s expansion into transformative therapy offers fresh hope against cancer -
What to consider before going all in on AI-driven email security -
GrayMatter Robotics opens 100,000-sq-ft AI robotics innovation centre in California -
The silent deal-killer: why cyber due diligence is non-negotiable in M&As -
South African students develop tech concept to tackle hunger using AI and blockchain -
Automation breakthrough reduces ambulance delays and saves NHS £800,000 a year -
ISF warns of a ‘corporate model’ of cybercrime as criminals outpace business defences


























