Intrusion Prevention



This indicates detection of a JavaScript-based cryptocurrency miner that runs on browsers.
These miners do not have to compromise the machine to mine.

Affected Products

Any unprotected systems are vulnerable


Unauthorized Resource Consumption: Remote actors can use the victim's system resources to perform certain tasks

Recommended Actions

Prevent the scripts from being downloaded to client browsers.
Monitor the traffic from that network for any suspicious activity.