Detect and stop unauthorized cryptomining in your cloud workloads with Datadog CSM Threats
Cloud environments are vulnerable to various cyberattacks, including unauthorized cryptomining. Detecting these attacks is challenging as they often mimic regular cloud resource usage. Datadog CSM Threats helps identify and stop such activity by monitoring for suspicious processes and automatically killing them upon detection. This enables teams to focus on addressing security vulnerabilities and preventing future attacks. Key signs of unauthorized cryptomining include high CPU usage, overclocking, declining service performance, and sudden cost spikes. To prevent these attacks, teams should patch affected resources with the latest updates, fix access controls, and ensure proper configuration of cloud workloads.
Company
Datadog
Date published
March 19, 2024
Author(s)
Parag Baxi, Nathaniel Beckstead, Mallory Mooney
Word count
903
Hacker News points
None found.
Language
English