What You Need to Know Before
You Start

Starts 10 June 2025 06:14

Ends 10 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

From DDoS to Mining - Chinese Cybercriminals Set Their Sights on Monero

Explore how Chinese cybercriminals are shifting focus from DDoS attacks to cryptocurrency mining, particularly targeting Monero, and the implications for cybersecurity.
via YouTube

2565 Courses


44 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore how Chinese cybercriminals are shifting focus from DDoS attacks to cryptocurrency mining, particularly targeting Monero, and the implications for cybersecurity.

Syllabus

  • Introduction to Cybercrime and Cryptocurrency
  • Overview of cybercriminal activities
    Introduction to cryptocurrency and its appeal for illegal activities
  • Understanding DDoS Attacks
  • What are DDoS attacks?
    Historical context and motivation behind DDoS by Chinese cybercriminals
  • Cryptocurrency Mining Fundamentals
  • How cryptocurrency mining works
    Specific challenges and requirements of mining
  • Why Monero?
  • Unique features of Monero that appeal to cybercriminals
    Comparison with other cryptocurrencies
  • The Shift from DDoS to Mining
  • Factors influencing the shift from DDoS to cryptocurrency mining
    Case studies of recent shifts targeting Monero
  • Techniques Used in Monero Mining
  • Malware and software used for Monero mining
    Botnets and cryptojacking strategies
  • Implications for Cybersecurity
  • Risks and challenges posed by cryptocurrency mining malware
    How cybersecurity strategies need to adapt
  • Detection and Prevention Strategies
  • Identifying signs of unauthorized mining
    Developing and implementing cybersecurity measures
  • Legal and Ethical Considerations
  • Legal ramifications for cybercriminals
    Ethical concerns for cybersecurity professionals
  • Future Trends and Predictions
  • Emerging trends in cybercrime related to cryptocurrency
    Speculations on future targets and defenses
  • Conclusion and Summary
  • Recap of key points discussed
    The ongoing evolution of cybercrime tactics and defenses
  • Resources and Further Reading
  • Recommended books, articles, and online resources
    Organizations and forums related to cybersecurity and cryptocurrency

Subjects

Conference Talks