Last updated on January 19, 2024

What is Cryptojacking?

Cryptojacking is a form of cybercrime which involves access to peoples’ devices (computers, tablets, smartphones, and servers) in an unauthorized manner by cybercriminals to mine cryptocurrency. Similar to other cybercrimes the main objective of this is making illegal profit.

How does cryptojacking operate?

Cybercriminals hack into devices secretly to install cryptojacking software. Then the installed software works in the background either mining for cryptocurrencies or stealing from cryptocurrency wallets. Hackers use two main techniques to mine cryptocurrencies:

  • By prompting victims to click on malicious links in emails that load crypto mining codes on their computers.
  • By infecting websites or online ads written in JavaScript codes which can auto-run in the victims’ browsers.
How does cryptojacking software differ from other types of malicious software?

It is known as a harmless silent crime as it steals only the power of victims’ computers. Basically the software does not cause damage to devices or the data compromised. However, this process incurs real costs for organizations in various ways.

Signs to understand that you are a victim of cryptojacking:
  • A noticeable decrease in device speed (slowdown).
  • Unusual overheating of device batteries.
  • Instances of devices shutting down due to insufficient processing power.
  • Reduced overall productivity of your devices or routers.
  • Unexpected increases in electricity costs / consumption.
How to protect against cryptojacking?
  • Monitor computer resources such as speed and power usage.
  • Utilize browser extensions/ add-ons designed to block crypto coin mining.
  • Use ad blockers to prevent malicious ads containing crypto jacking scripts.
  • Keep the operating system and all relevant applications, particularly those related to browsing up-to-date.
  • Stay vigilant about the latest crypto jacking trends.
  • Refrain from visiting pages that may deliver crypto jacking scripts.