← Back to BrewedIntel
othermediumCryptojackingResource Hijacking

Feb 21, 2024 • Wiz Security Research

Proof of storage crypto miners

This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional...

Source
Wiz Security Research
Category
other
Severity
medium

Executive Summary

This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional proof-of-work mining that consumes CPU/GPU resources, proof-of-storage utilizes disk space, creating unique challenges for detection. The primary threat identified is proof-of-storage cryptojacking, where attackers unauthorizedly use victim storage capacity to mine cryptocurrency. This can lead to significant hardware degradation, reduced system performance, and increased operational costs for affected organizations. While no specific threat actors or malware families are attributed in this report, the potential for abuse exists within the broader cryptomining ecosystem. Defenders are advised to implement robust monitoring strategies focused on unusual disk usage patterns and unauthorized software installations. Proactive detection measures are essential to mitigate the risk of resource hijacking. Security teams should update their threat models to include storage-based mining vectors alongside conventional CPU and GPU mining threats to ensure comprehensive coverage against evolving cryptojacking techniques.

Summary

We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them.

Published Analysis

This article examines the emerging threat landscape surrounding proof-of-storage cryptocurrencies, specifically highlighting Chia. Unlike traditional proof-of-work mining that consumes CPU/GPU resources, proof-of-storage utilizes disk space, creating unique challenges for detection. The primary threat identified is proof-of-storage cryptojacking, where attackers unauthorizedly use victim storage capacity to mine cryptocurrency. This can lead to significant hardware degradation, reduced system performance, and increased operational costs for affected organizations. While no specific threat actors or malware families are attributed in this report, the potential for abuse exists within the broader cryptomining ecosystem. Defenders are advised to implement robust monitoring strategies focused on unusual disk usage patterns and unauthorized software installations. Proactive detection measures are essential to mitigate the risk of resource hijacking. Security teams should update their threat models to include storage-based mining vectors alongside conventional CPU and GPU mining threats to ensure comprehensive coverage against evolving cryptojacking techniques. We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them. We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them.