Company
Date Published
Author
Parag Baxi, Nathaniel Beckstead, Mallory Mooney
Word count
903
Language
English
Hacker News points
None

Summary

Cloud environments are vulnerable to various cyberattacks, including unauthorized cryptomining. Detecting these attacks is challenging as they often mimic regular cloud resource usage. Datadog CSM Threats helps identify and stop such activity by monitoring for suspicious processes and automatically killing them upon detection. This enables teams to focus on addressing security vulnerabilities and preventing future attacks. Key signs of unauthorized cryptomining include high CPU usage, overclocking, declining service performance, and sudden cost spikes. To prevent these attacks, teams should patch affected resources with the latest updates, fix access controls, and ensure proper configuration of cloud workloads.