Exploiting Cryptocurrency Miners with OSINT Techniques

Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6

Abstract

Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information about specific targets. The accessibility to critical information about emerging systems through OSINT leads exposure of vulnerabilities and exploitation of these vulnerabilities to form widespread attack. Blockchain is one of the emerging technologies that exposed the use of crypto currencies such as Bitcoin and Ethereum. This research paper explains the use of OSINT to gather critical information about cryptocurrency miners such as Bitcoin Antminer and Ethereum Claymore and expose the vulnerabilities to exploit the configuration file of the miner manager. The research outcomes expose the vulnerability of the existing crypto currencies and use of OSINT for detection and analysis of cyberthreat in crypto currency market.

Authors and Affiliations

Arif Sari, Seyfullah Kilic

Keywords

Related Articles

Water Wave Optimization Algorithm based Congestion Control and Quality of Service Improvement in Wireless Sensor Networks

Many researchers have implemented various machine learning algorithms and verify their results with the existing algorithms to control congestion in Wireless Sensor Networks. The major challenge lies in developing an alg...

Advances in Artificial Intelligence Are you sure, we are on the right track?

Over the past decade, AI has made a remarkable progress. It is agreed that this is due to the recently revived Deep Learning technology. Deep Learning enables to process large amounts of data using simplified neuron netw...

The Performance Evaluation of Voip for a Mobile User

Broadband Wireless Access (BWA) technology has developed rapidly and it has dominated the advancement of technology especially in wireless networks. This paper studies the performance evaluation of VoIP for a mobile user...

Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File

The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day...

Download PDF file
  • EP ID EP265982
  • DOI 10.14738/tnc.56.4083
  • Views 93
  • Downloads 0

How To Cite

Arif Sari, Seyfullah Kilic (2017). Exploiting Cryptocurrency Miners with OSINT Techniques. Transactions on Networks and Communications, 5(6), 62-76. https://europub.co.uk/articles/-A-265982