2017
DOI: 10.14738/tnc.56.4083
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Cryptocurrency Miners with OISNT Techniques

Abstract: Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information about specific targets. The accessibility to critical information about emerging systems through OSINT leads exposure of vulnerabilities and exploitation of these vulnerabilities to form widespread attack. Blockchain is one of the emerging technologies that exposed the use of crypto currencies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Over time, the term became conspicuous for national security and law enforcement agencies (Gruters & Gruters, 2018; Kalpakis et al, 2016; Ziolkowska, 2018). In the present scenario, it has become a valuable asset in the fields of education (Kim et al, 2013), transportation (Bojan et al, 2015), government applications (S. Agarwal, 2017), cryptocurrency (Sari & Kilic, 2017), health (Bernard et al, 2018), and cybersecurity Kalpakis et al,. The nature of data for each of these fields is different.…”
Section: Workflow For Osint Extractionmentioning
confidence: 99%
“…Over time, the term became conspicuous for national security and law enforcement agencies (Gruters & Gruters, 2018; Kalpakis et al, 2016; Ziolkowska, 2018). In the present scenario, it has become a valuable asset in the fields of education (Kim et al, 2013), transportation (Bojan et al, 2015), government applications (S. Agarwal, 2017), cryptocurrency (Sari & Kilic, 2017), health (Bernard et al, 2018), and cybersecurity Kalpakis et al,. The nature of data for each of these fields is different.…”
Section: Workflow For Osint Extractionmentioning
confidence: 99%
“…A lot of applications of this distributed technology have developed in different countries to improve publicly provided government services [24].…”
Section: Usage Of Blockchain Over Existing Systemsmentioning
confidence: 99%
“…Bartino and Nayeem [61] highlighted worms in IoT devices that hijacked them for mining purposes, pointing to the infamous Linux.Darlloz worm that hijacked devices running Linux on Intelx86 chip architecture for mining. Sari and Kilik [62], used Open Source Intelligence (OSINT) to study vulnerabilities in mining pools with the Mirai botnet as a case study.…”
Section: Related Workmentioning
confidence: 99%