Nine years after Bitcoin code was first released, crypto currencies are more popular than ever. Despite the wild fluctuations in their prices, more people than ever are entering the markets and participating in the cryptocurrency revolution. And since a lot of money is involved, hackers aiming to get rich at others’ expense are flocking to the cryptocurrencies domain as well.
Crypto currencies are generally regarded as reliable currencies, despite the lack of a central issuing authority. Blockchain technology is used to create crypto currency via crypto ‘mining’ and ensures that every transaction is verified and recorded in a public, distributed ledger, that is impossible to edit after it occurred. While the mining process to harvest those crypto currencies is 100% secure, the safety and ‘well-being’ of other related computing resources is not. The reason for this is called Crypto-Jacking.
Crypto-Jacking impacts user experience, since computing resources are allocated towards the hidden mining process and increase energy consumption. Most importantly though, it demonstrates how hackers have found a way to cash in at others’ expense.
Browser plug-ins, which filters sites suspected of being compromised, partially protecting endpoint from in-browser crypto-jacking. A better solution, however, which protects against known and unknown compromised sites, is to protect organization devices using the power of isolation.
Remote browser isolation (RBI) leverages virtual browsers that reside away from the endpoint, in disposable containers located in the DMZ or cloud. The virtual browsers are optimized to provide a smooth browsing experience and have sufficient computing power to do so, yet lack the extra resources required to make them attractive crypto-jacking targets.
Moreover, to prevent malware persistency, the disposable container running in the remote browser was designed to terminate after a brief idle time. As a result, these remote browsing sessions are too short for an effective crypto-jacking session.
Isolation has proven effective in neutralizing browser-borne threats.
Daniel Miller, Director of Product Marketing, Ericom Software