Feb 21, 2024 • Wiz Security Research
Proof of storage crypto miners
This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional...
Executive Summary
This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional proof-of-work mining that consumes CPU/GPU resources, proof-of-storage utilizes disk space, creating unique challenges for detection. The primary threat identified is proof-of-storage cryptojacking, where attackers unauthorizedly use victim storage capacity to mine cryptocurrency. This can lead to significant hardware degradation, reduced system performance, and increased operational costs for affected organizations. While no specific threat actors or malware families are attributed in this report, the potential for abuse exists within the broader cryptomining ecosystem. Defenders are advised to implement robust monitoring strategies focused on unusual disk usage patterns and unauthorized software installations. Proactive detection measures are essential to mitigate the risk of resource hijacking. Security teams should update their threat models to include storage-based mining vectors alongside conventional CPU and GPU mining threats to ensure comprehensive coverage against evolving cryptojacking techniques.
Summary
We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them.
Published Analysis
This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional proof-of-work mining that consumes CPU/GPU resources, proof-of-storage utilizes disk space, creating unique challenges for detection. The primary threat identified is proof-of-storage cryptojacking, where attackers unauthorizedly use victim storage capacity to mine cryptocurrency. This can lead to significant hardware degradation, reduced system performance, and increased operational costs for affected organizations. While no specific threat actors or malware families are attributed in this report, the potential for abuse exists within the broader cryptomining ecosystem. Defenders are advised to implement robust monitoring strategies focused on unusual disk usage patterns and unauthorized software installations. Proactive detection measures are essential to mitigate the risk of resource hijacking. Security teams should update their threat models to include storage-based mining vectors alongside conventional CPU and GPU mining threats to ensure comprehensive coverage against evolving cryptojacking techniques. We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them. We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them.