In this talk we'll take you through some exploits that have been used to drop cryptocoin mining applications, attribution to mining pools and private wallets, and the potential dollar values raked in so far by each campaign. You'll also take away key indicators that you can use to find cryptojacking in your network.
I hack things at Keysight/Ixia. Previously I've worked for BreakingPoint Systems, Spirent Communications, and Imperfect Networks. I hide in a cave in Massachusetts near New Hampshire. I like to talk about security stuff that I find at work and spare time.