What is Crypto jacking?

What is cryptojacking?

Cryptojacking is the unauthorized use of a computer, tablet, mobile phone, or connected home device by cybercriminals to mine for cryptocurrency.

Why cryptojacking is growing?

It’s hard to explain how cryptocurrencies gain monetary value; however, it is based in part on the principle of supply and demand, and the difficulty of obtaining the cryptocurrency. For example, there are only a finite number of Bitcoins that have not been completely mined. There are other variables such as how easy the currency is to use, the energy and equipment put into mining it, and more.

For these reasons and others, cryptocurrency has fluctuated in value in the past several years. In 2010, a Bitcoin was set at less than 1 cent.

According to Symantec’s Internet Security Threat Report, cryptojacking also skyrocketed in 2017.

In a sense, cryptojacking is a way for cybercriminals to make free money with minimal effort. Cybercriminals can simply hijack someone else’s machine with just a few lines of code. This leaves the victim bearing the cost of the computations and electricity that are necessary to mine cryptocurrency. The criminals get away with the tokens.

Toward the end of 2017, when the value of cryptocurrency was at its peak, there were about 8 million coin-mining events blocked by Symantec in December alone. Because cryptojacking can yield lucrative results, coin-mining activity increased by 34,000 percent over the course of the year.

How cryptojacking works?

Coin mining on your own can be a long, costly endeavor. Elevated electricity bills and expensive computer equipment are major investments and key challenges to coin mining. The more devices you have working for you, the faster you can “mine” coins. Because of the time and resources that go into coin mining, cryptojacking is attractive to cybercriminals.

There are a few ways cryptojacking can occur. One of the more popular ways is to use malicious emails that can install cryptomining code on a computer. This is done through phishing tactics. The victim receives a seemingly harmless email with a link or an attachment. Upon clicking on the link or downloading the attachment, it runs a code that downloads the cryptomining script on the computer. The script then works in the background without the victim’s knowledge.

Another is known as a web browser miner. In this method, hackers inject a cryptomining script on a website or in an ad that is placed on multiple websites. When the victim visits the infected website, or if the malicious ad pops up in the victim’s browser, the script automatically executes. In this method, no code is stored on the victim’s computer.

In both these instances, the code solves complex mathematical problems and sends the results to the hacker’s server while the victim is completely unaware.

How to detect cryptojacking
As with any other malware infection, there are some signs you may be able to notice on your own.

Symptoms of cryptojacking?

High processor usage on your device
Sluggish or unusually slow response times
Overheating of your device.

How to prevent cryptojacking?

A strong internet security software suite such as Norton Security™ can help block cryptojacking threats.

In addition to using security software and educating yourself on cryptojacking, you can also install ad-blocking or anti-cryptomining extensions on web browsers for an extra layer of protection. As always, be sure to remain wary of phishing emails, unknown attachments, and dubious links.


Source: us.norton!com/internetsecurity-malware-what-is-cryptojacking.html


:clap: a very big round of applause for you here.

1 Like

This is the first i am reading about Crypto jacking. Very informative content.

1 Like

Actually have not heard of this…this is insightful

1 Like

How much text… :scream: :laughing:

1 Like

Its better just dont stalk at your home pc in some bad sites. For internet stalking fine thing is to have a virtual machine on your pc, that can be setted in sandbox, from where no ransomware can find you. That antivirus (most of them) is crap and do same stuff (eat your pc power) and block what they think is suspicious (not same for you) in order to catch just old tricks. So internet culture and computer science at base level is way more protective. Still, thanks for share, it vital to know this, maybe will helo some people to see that they mine monero for someone)))


Quite informative, has this been found to happen in smartphones? I have been killing all the apps that keep using my internet data/traffic. Nothing serious so far.

1 Like

Useful post. This is my first time I read about crypto jacking

1 Like

Qudos to you friend!!!
This is very important and useful for each and every one of us. We need to take note.

1 Like

Informative :clap:t2::clap:t2:.

How about ESET node mobile security? Wouldn’t you recommend that too?