Table 1 Cryptomining attack. Security analysis.

From: Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Threat

Description

Impact

Risk

Covered channel

Use of well known protocols such as HTTPS will avoid detection 

Long-term concealment. Compromised system stay covered over long periods of time, due the lack of detection with classical tools

Very high

Abuse of resources

Steal computer capacity in terms of CPU/memory

Unforeseen cost, in term of energy demanded or billing in pay per use model

High

Malfunctioning

Competition over resources lead to some application to fail, e.g. lack of memory

Application degradation or disruption caused by resource competitiveness especially in virtualized environment

High

Other malicious activity

Once compromised the system it can be dedicated to other illegal activities, e.g.: Distributed Denial of Service (DDoS), ransomware, etc.

Data loss, bandwidth outages

Medium

Lateral movement

Compromise machine can be used as entry point for recognition (IP scanning) and propagation, inside the perimeter

Malware propagation, Advanced Persistent Threat (APT), data extrafiltration

Medium

IP reputation

Source IP address is associated with malicious activity and added in IP bad reputation list

Public IPs associated to NAT can be blocked on the Internet, creating additional disruption

Low