Crypto Mining on Company Servers

Trend Alert: Crypto Mining on Company Servers

There is a new cyber security risk trending: crypto mining on company servers. This trend involves either an insider or malicious software using your company server to mine Bitcoin or other cryptocurrencies. A vulnerability assessment can determine if this is happening at your company. Here are more details on this disturbing trend.

Crypto Mining Defined

Bitcoin is the most popular cryptocurrency, but there are actually more than 10,000 different types of digital coins, according to Statistica. Crypto mining is  the process by which new cryptocurrencies enter into circulation. Cryptocurrency is harder to trace than traditional currency, which is why it is the payment method of choice for ransomware attacks and other cyber crime. Crypto mining is done by using complex computer code and supporting hardware. It needs a big server with lots of bandwidth and a high-speed internet connection. 

It is relatively easy for someone to start stealing valuable resources from your company with crypto mining. In fact, popular antivirus Norton 360 recently released Norton Crypto to mine your computer when it is idle. There are many types of crypto mining software out there and crypto mining is a numbers game. To make it profitable, it takes a lot of hardware. And your business has far more hardware than the average individual. So, when these kinds of software are loaded onto company servers, they steal valuable bandwidth and resources from legitimate business functions to mine crypto. 

The Immediate Effects

Remember years ago when employees used to take home a ream of paper, a stapler or a couple dozen pens from the office stockroom? Well, that’s crypto mining  in today’s workplace. But, instead of stealing office supplies, employees are stealing time and resources. Usually they are doing this on company time when they  install, monitor and manage the mining software  — to say nothing about the software eating up tremendous amounts of electricity and bandwidth, for which the company pays. 

Aside from the cost of the theft itself, crypto mining could potentially slow down other network operations that are needed to run your business.  If there are any IT team personnel  whom you suspect  might be tempted to install unauthorized software you should bring HR in to talk about IT issues.

Vulnerability Is the Biggest Threat

If your servers are being crypto mined,  your network is highly  vulnerable to malware attacks. 

Any unauthorized software installed on your network puts your entire system at risk, even if the intent is not to mine crypto. It leaves a large cybersecurity gap in your network.

Concerned About Crypto Mining on Company Servers? Call a Local Pro 

Aeko Technologies is in your Dallas Fort Worth backyard. We not only work here, we live here, too, and we’re very supportive of our neighbors. Our cybersecurity blog will help explain the different types of threats and what can be done about them. Check it out, contact us or book a no-obligation meeting. We’d be happy to explain the pros, cons and advantages of working with a managed service provider such as Aeko Technologies.

Posted in

Are you aware of the most common cyberattack methods?

Did you know there are over 3.4 billion phishing emails sent every day? Phishing and other cybercriminal behavior are a lot more common than you’d think.

Our free “Phishing, Smishing, Vishing, Pharming? A Cyberattacks Guide” will inform you about cyberattack methods and give you the latest in data security tips. 

Phishing Smishing Vishing Pharming Download Promo

Download Now


Brian Rodgers

Before Brian founded Aeko in 2016, he oversaw large teams as an IT executive within the oil and gas industry, leading the technology infrastructure that helped that company grow to an S&P 500 company. He is passionate about bringing those same strategies to small and midsize businesses, enabling them to scale their services and adapt more quickly to market changes.