To see the indicators associated with Coinhive, visit our RiskIQ Community Public project here.
Of course, this Monero mining technique is also an opportunity for bad actors to spin up fake, illegitimate websites to siphon money off of major brands with typosquatting domains. By leveraging domains or subdomains that appear to belong to major brands, these actors trick people into visiting their sites running the Coinhive Monero mining script to monetize their content. In the 991 domains we found, there were many examples of typo-squatting and domain infringement.
Know What's Running on Your Web Properties
Unfortunately, Security teams lack visibility into all of the ways that they can be attacked externally, and struggle to answer the question, “where are the weaknesses in the armor?” The answer lies in understanding what belongs to your organization, how it’s connected to the rest of your asset inventory, and what potential vulnerabilities are exposed to compromise. In the case of Coinhive, it means being able to inventory all the third party code running on your web assets, and being able to detect instances of cyber threat actors leveraging your brand on their illegitimate sites around the internet.
Currently, 92% of customers using RiskIQ Digital Footprint Enterprise had, at best, partial visibility into their internet-exposed digital assets before partnering with RiskIQ, half of which claimed to increase their insight into digital threats by at least 50% with our automated discovery and management capability.
Signing up for RiskIQ Community Edition now gives you access to one of the most popular RiskIQ products–Digital Footprint. When you sign up or sign in with your organizational email address, you get a glimpse into your organization’s attack surface.
The RiskIQ Intelligence Connector for Microsoft Azure Sentinel Is the Context-Rich Force Multiplier Security Teams Need
Digital initiatives have changed the enterprise attack surface and how organizations appear online, both to users and malicious actors. Meanwhile, the threat landscape has evo...