Crypto Blog
Cryptojacking threat
Jake Billingham

Cryptojacking threat

What is cryptojacking ?

Cryptojacking is the unapproved use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer or by infecting a website or online ad with JavaScript code that auto executes once loaded in the victim’s browser.

Cryptojacking scripts do no damage to computers or victims’ data. They do steal CPU processing resources. For individual users, slower computer performance might be just an irritating thing. However, organizations with plenty cryptojacked systems can incur real costs in terms of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem.

Hackers can trick a victim into loading cryptomining code onto their computers.This is done through phishing like tactics. Victims receive a legitimate-looking email that encourages them to click on a link. The link runs code that places the cryptomining script on the computer. The script then runs in the background as the victim works.

The other method is to inject a script on a website or an ad that is delivered to multiple websites. Once victims visit the website or the infected ad pops up in their browsers, the script automatically executes. No code is stored on the victims’ computers. Whichever method is used, the code runs complex mathematical problems on the victims’ computers and sends the results to a server that the hacker controls.

Usually, both methods are used for better results. Some cryptomining scripts have worming capabilities that allow them to infect other devices and servers on a network. It also makes them harder to find and remove, maintaining persistence on a network is in the cryptojacker's best financial interest.

Jake Billingham

Jake Billingham

Our community unites crypto enthusiasts

Leave a comment

Similar Posts

Categories