Support
 
Support Get Quote
 
 
 
 

Detecting Threats in Windows

Detecting unauthorized cryptocurrency mining

With the rising value and prominence of cryptocurrencies like Bitcoin, Ethereum, and Monero, many hackers have found it profitable to hijack devices to mine cryptocurrency. Although the impact of unauthorized cryptocurrency mining–or cryptojacking–is less dangerous than ransomware, it can still be fairly annoying for enterprises to deal with.

Cryptocurrency mining is a highly intensive computing process which can slow down an employee’s machine. Placing high loads on CPUs and running them like this for a prolonged period will shorten their lifespan, drain laptop batteries, and increase electricity costs. The aggregate effect of large-scale unauthorized cryptocurrency mining in an organization can be significant, as it can force business-critical assets to slow down or stop functioning effectively.

Plus, the presence of unauthorized cryptocurrency mining software indicates that insufficient security controls are in place. If it's possible for malware to enter an enterprise network and spread cryptocurrency mining software without being detected, then that same vector can be used to deliver many other, more serious threats.

Identifying unauthorized cryptocurrency mining with EventLog Analyzer

You can use the predefined rules of EventLog Analyzer's correlation module to identify and alert you about the following activity:

  • The use of cryptocurrency wallet software like Electrum, Jaxx, and Exodus.
  • Initialization of cryptocurrency mining software like CGMiner and BFGMiner.
  • Extended periods of high CPU usage.
  • Extended periods of high machine temperature.

These predefined rules can be customized to alert you about other events as well. EventLog Analyzer also generates reports and alerts for any related events, allowing you to quickly take measures to prevent unauthorized cryptocurrency mining in your organization and protect your resources.

Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Log Management