What You Need to Know Before
You Start
Starts 10 June 2025 06:14
Ends 10 June 2025
00
days
00
hours
00
minutes
00
seconds
44 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore how Chinese cybercriminals are shifting focus from DDoS attacks to cryptocurrency mining, particularly targeting Monero, and the implications for cybersecurity.
Syllabus
- Introduction to Cybercrime and Cryptocurrency
- Understanding DDoS Attacks
- Cryptocurrency Mining Fundamentals
- Why Monero?
- The Shift from DDoS to Mining
- Techniques Used in Monero Mining
- Implications for Cybersecurity
- Detection and Prevention Strategies
- Legal and Ethical Considerations
- Future Trends and Predictions
- Conclusion and Summary
- Resources and Further Reading
Overview of cybercriminal activities
Introduction to cryptocurrency and its appeal for illegal activities
What are DDoS attacks?
Historical context and motivation behind DDoS by Chinese cybercriminals
How cryptocurrency mining works
Specific challenges and requirements of mining
Unique features of Monero that appeal to cybercriminals
Comparison with other cryptocurrencies
Factors influencing the shift from DDoS to cryptocurrency mining
Case studies of recent shifts targeting Monero
Malware and software used for Monero mining
Botnets and cryptojacking strategies
Risks and challenges posed by cryptocurrency mining malware
How cybersecurity strategies need to adapt
Identifying signs of unauthorized mining
Developing and implementing cybersecurity measures
Legal ramifications for cybercriminals
Ethical concerns for cybersecurity professionals
Emerging trends in cybercrime related to cryptocurrency
Speculations on future targets and defenses
Recap of key points discussed
The ongoing evolution of cybercrime tactics and defenses
Recommended books, articles, and online resources
Organizations and forums related to cybersecurity and cryptocurrency
Subjects
Conference Talks