/plushcap/analysis/datadog/datadog-csm-threats-cryptomining

Detect and stop unauthorized cryptomining in your cloud workloads with Datadog CSM Threats

What's this blog post about?

Cloud environments are vulnerable to various cyberattacks, including unauthorized cryptomining. Detecting these attacks is challenging as they often mimic regular cloud resource usage. Datadog CSM Threats helps identify and stop such activity by monitoring for suspicious processes and automatically killing them upon detection. This enables teams to focus on addressing security vulnerabilities and preventing future attacks. Key signs of unauthorized cryptomining include high CPU usage, overclocking, declining service performance, and sudden cost spikes. To prevent these attacks, teams should patch affected resources with the latest updates, fix access controls, and ensure proper configuration of cloud workloads.

Company
Datadog

Date published
March 19, 2024

Author(s)
Parag Baxi, Nathaniel Beckstead, Mallory Mooney

Word count
903

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.