Cryptojacking: Impact, Attack Examples, and Defensive Measures (2024)

What Is Cryptojacking?

Cryptojacking is the unauthorized use of someone’s computer to mine cryptocurrency. This is typically done by installing malware on the victim’s computer that uses their processing power to mine cryptocurrency without their knowledge or consent.

Cryptomining can slow down the victim’s computer and cause it to use more electricity, potentially leading to higher electricity bills for the victim. Cryptojacking is a form of cyber attack and is illegal in many countries.

This is part of a series of articles about application security.

In this article:

  • How Does Cryptojacking Malware Work?
  • The Impact of Cryptojacking
  • Cryptojacking Attack Methods
  • Cryptojacking Examples
  • Coinhive
  • WannaMine v4.0
  • FaceXWorm
  • Black-T
  • Best Practices for Detecting and Preventing Cryptojacking Attacks
  • Cryptojacking Attacks in Cloud Native

How Does Cryptojacking Malware Work?

Cryptojacking is prevalent because it has a low entry barrier and is highly profitable. Hackers can sneak into devices and run cryptomining malware with just a few lines of code (usually JavaScript), operating undetected in the background.

Cryptojackers often bait users into clicking on links in phishing emails and downloading malicious code to their devices. Another approach is to infect websites using cryptojacking command lines embedded in HTML code—this code then runs the mining program automatically when the user opens the infected webpage.

Some types of cryptojacking malware can even pass the virus to additional devices. In some cases, attackers can benefit from the large computing resources of a server farm for free.

Cryptojacking attacks don’t usually involve the corruption or theft of personal data. The main objective is to access and utilize the machine’s computing power. Hackers have an incentive to remain undetected because the longer the mining program runs, the more cryptocurrency they can obtain.

The Impact of Cryptojacking

The main way that cryptojacking impacts a victim’s computer is by slowing it down and causing it to use more electricity. This is because the malware installed on the victim’s computer will use their computer’s processing power to mine cryptocurrency.

Cryptojacking malware can strain a computer’s hardware, cause it to overheat, and might shorten its lifespan. In addition, having malware installed on a computer can leave it vulnerable to other attacks.

Cryptojacking Attack Methods

There are two main types of cryptojacking attacks:

  • Web browser-based attacks involve using a website or online ad to deliver the cryptojacking malware to the victim’s computer. When the victim visits the website or clicks on the ad, the malware is automatically downloaded and installed on their computer. This type of attack is known as “drive-by cryptojacking” because the victim’s computer is compromised simply by visiting a website.
  • Host-based attacks involve installing the cryptojacking malware directly on the victim’s computer. This can be done through a variety of methods, such as sending the victim a malicious email attachment, using a fake app or game that contains the malware, or compromising the supply chain of a legitimate software provider and inserting the malware into the software.

Cryptojacking Examples

Coinhive

Coinhive was a cryptocurrency mining service that was launched in 2017. It allowed website owners to embed a JavaScript code on their websites, which would then use the website visitor’s computer to mine the Monero cryptocurrency. This was known as “in-browser mining,” and it was a form of cryptojacking.

Coinhive was designed to be a legitimate way for website owners to generate revenue from their websites without relying on advertising. However, it was widely used by attackers to deliver cryptojacking malware to victims’ computers without their knowledge or consent. Eventually, Coinhive was shut down in March 2019 due to declining user interest and increasing regulatory scrutiny.

WannaMine v4.0

WannaMine is a type of malware that is used in cryptojacking attacks, first discovered in 2018. It is typically delivered to victims’ computers through a phishing email that contains a malicious attachment. When the victim opens the attachment, the WannaMine malware is installed on their computer. The malware then uses the victim’s computer to mine the Monero cryptocurrency.

In addition to mining cryptocurrency, WannaMine is also designed to spread itself to other computers on the same network. WannaMine v4.0 is the latest version of the WannaMine malware. It was discovered in 2020 and is known for using multiple methods to avoid detection and removal. It is also capable of stealing sensitive information from the victim’s computer.

FaceXWorm

FaceXWorm uses social engineering to trick Facebook Messenger users into clicking fake YouTube links. They arrive at a fake site that urges users to download a Chrome extension to view the content—this extension hijacks their Facebook account and connects them to a network of friends, to allow the worm to spread. In addition, it deploys the FaceXWorm malware and starts mining cryptocurrency on their device.

FaceXWorm does not only hijack a user’s device to mine cryptocurrency. When users try to log in to certain sites, such as Google or MyMonero, their credentials are hijacked, and they are redirected to fake platforms that require the user to pay cryptocurrency. As part of this process, the worm leverages the user’s credentials to transfer large amounts of cryptocurrency to the attackers.

Black-T

Black-T is a cryptojacking malware variant created by TeamTNT, a cybercriminal group that targets AWS credentials on compromised systems and mines for Monero currency. Traditionally, TeamTNT targeted APIs with exposed Docker daemons and scanned for vulnerable systems to carry out cryptojacking attacks.

However, the Black-T code provides enhanced capabilities, including targeting and blocking previously unknown cryptojacking worms like the Crux worm and ntpd miner (a redis-bakup cryptominer). It also uses password scraping operations in memory with mimipenguins and mimipy, identifying passwords and exfiltrating them to the TeamTNT control center.

Black T can also extend the group’s cryptojacking efforts by combining different network scanners to identify Docker daemon APIs in the target network, including in local and public networks. These include pnscan, masscan, and zgrab—the first time TeamTNT has used a GoLang tool.

Best Practices for Detecting and Preventing Cryptojacking Attacks

The following best practices can help detect and prevent cryptojacking in your organization:

  • Keep computers and web browsers up to date—make sure that devices and web browsers are always running the latest version, as these updates often include security fixes that can protect against new forms of malware.
  • Use a reputable anti-malware software—install and regularly update antivirus and security software on all devices to help protect against malware and other threats.
  • Educate users to be cautious when opening emails and attachments—emails and attachments from unknown sources are often used to deliver malware, including cryptojacking.
  • Prevent unauthorized downloads—implement company policies and content filtering systems to ensure users can only download legitimate, approved software.
  • Use ad blockers—consider using a reputable ad blocker to protect against drive-by cryptojacking attacks that use online ads or popups.
  • Use zero-day protection—zero-day protection involves using software or other technologies to protect against new and unknown threats that have not been seen before. This can help protect against new forms of cryptojacking that are not yet recognized by traditional antivirus and security software.
  • Implement strong authentication—strong authentication involves using multiple methods to verify a user’s identity before granting them access to a system or network. This can help prevent access to sensitive systems by cryptojacking malware.
  • Protect cloud resources—the cloud can provide large-scale resources for cryptojacking. If you use cloud computing services, make sure to properly secure cloud resources to prevent unauthorized access—implement strong authentication, encrypt data in transit and at rest, and regularly update your security software and settings.
  • Use anti-bot protection—anti-bot protection involves using software or other technologies to detect and prevent botnets, which are networks of compromised computers that are often used to distribute malware. Anti-bot protection can help prevent malware from spreading to a computer or network.

Cryptojacking Attacks in Cloud Native

Hackers compromise cloud accounts to create distributed cryptomining workloads—they compromise vulnerable and misconfigured cloud computing resources and use it for cryptomining, overloading systems and resulting in higher charges for cloud services.

For example, the Romanian hacker group Outlaw compromises Linux servers and Internet of Things (IoT) devices by using default or stolen credentials and exploiting known vulnerabilities to launch DDoS attacks or mine Monero currency. Another group, TeamTNT, is more sophisticated, targeting software service vulnerabilities—it claimed it would stop operating but ramped up its attacks instead.

Another group responsible for many cryptojacking exploits in the cloud is Kinsing. It quickly targeted the Log4j vulnerability to compromise cloud native environments. Other hackers have discovered ways to exploit free-tier services for continuous integration and continuous deployment (CI/CD) pipelines. They target Azure DevOps, CircleCI, BitBucket, GitHub, and GitLab to combine transient workloads into cryptomining cloud services.

Securing Cloud Native Applications with Aqua Security

Aqua replaces outdated signature-based approaches with modern controls that leverage the cloud-native principles of immutability, microservices and portability. Using dynamic threat analysis, machine-learned behavioral whitelisting, integrity controls and nano-segmentation, Aqua enables modern application security protection across the lifecycle.

Aqua’s full lifecycle security approach provides coverage for all clouds and platforms, integrating with enterprises’ existing infrastructure and the cloud native ecosystem.

Secure the Build

Accelerate development by detecting security issues in your artifacts early and shortening time to remediate. “Shift left” security into the CI/CD pipeline, get full visibility into the security posture of your pipeline and reduce the application attack surface before application deployment.

Secure the Infrastructure

Enforce compliance across the stack, gain real-time visibility and control over your security posture. Monitor, detect, and automatically remediate configuration issues across public cloud services and Kubernetes clusters. Ensure conformity with CIS benchmarks, PCI-DSS, HIPAA, GDPR and other regulations.

Secure the Workloads

Protect applications in runtime using a zero trust model, with granular controls that accurately detect and stop attacks. Unify security across VMs, containers, and serverless on any cloud, orchestrator, and operating system. Leverage micro-services concepts to enforce immutability and micro-segmentation.

Key features:

  • Vulnerability scanning: Scan CI pipelines and registries, container images, VM images, and functions. Find known vulnerabilities, malware, embedded secrets, OSS licensing, configuration, and permissions issues and prioritize based on potential impact
  • Dynamic Threat Analysis: Detect and mitigate hidden malware and supply chain attacks in container images using a secure sandbox
  • Cloud Security Posture Management (CSPM): Continuously audit cloud accounts and services for security risks and auto-remediate misconfiguration
  • Container Security: Use scan results to set policies for image deployment and prevent the use of unapproved images. Mitigate known vulnerabilities with Aqua vShield, preventing exploits with no code changes. Enforce container immutability by preventing drift against their originating images

As a cybersecurity expert with a deep understanding of cryptojacking and related concepts, I'll provide a comprehensive overview of the information presented in the article:

Cryptojacking Overview:

Definition: Cryptojacking is the unauthorized use of someone’s computer to mine cryptocurrency. This involves installing malware on a victim’s computer, using their processing power to mine cryptocurrency without their knowledge or consent.

How Does Cryptojacking Malware Work?

  1. Low Entry Barrier: Cryptojacking is prevalent due to its low entry barrier and high profitability. Hackers can run cryptomining malware with just a few lines of code, often in JavaScript, operating undetected in the background.

  2. Infection Methods:

    • Phishing Emails: Users are baited into clicking on links in phishing emails, leading to the download of malicious code.
    • Infected Websites: Cryptojackers infect websites using command lines embedded in HTML code, running the mining program automatically when users open the infected webpage.
    • Server Farms: Some malware can utilize the computing resources of server farms without detection.

The Impact of Cryptojacking:

  1. Computer Slowdown: Cryptojacking impacts victims by slowing down their computers.

  2. Increased Electricity Usage: The malware uses the victim's processing power, causing increased electricity consumption and potentially higher electricity bills.

  3. Hardware Strain: Cryptojacking malware strains a computer's hardware, causing overheating and potentially shortening its lifespan.

Cryptojacking Attack Methods:

  1. Web Browser-Based Attacks ("Drive-by Cryptojacking"): Malware is delivered through a website or online ad, automatically downloading and installing when the victim visits the site or clicks on the ad.

  2. Host-Based Attacks: Malware is directly installed on the victim's computer through methods such as phishing emails, fake apps, or compromising the supply chain of legitimate software providers.

Cryptojacking Examples:

  1. Coinhive (In-Browser Mining): A cryptocurrency mining service allowing website owners to embed JavaScript code for in-browser mining. Shut down in 2019 due to misuse.

  2. WannaMine v4.0: Malware delivered via phishing emails, spreading to other computers on the same network and using multiple methods to avoid detection.

  3. FaceXWorm: Uses social engineering on Facebook Messenger, spreading malware, hijacking accounts, and mining cryptocurrency. Also steals credentials and redirects users to fake platforms.

  4. Black-T by TeamTNT: Targets AWS credentials, mines Monero, and uses enhanced capabilities for cryptojacking, including password scraping.

Best Practices for Detecting and Preventing Cryptojacking Attacks:

  1. Keep Software Updated: Regularly update computers and web browsers to include security fixes.

  2. Use Anti-Malware Software: Install and update antivirus and security software.

  3. User Education: Train users to be cautious with emails and attachments, a common vector for malware.

  4. Prevent Unauthorized Downloads: Implement policies to ensure users only download legitimate software.

  5. Ad Blockers: Use reputable ad blockers to protect against drive-by cryptojacking attacks through online ads.

  6. Zero-Day Protection: Employ technologies that protect against new and unknown threats not recognized by traditional antivirus software.

  7. Strong Authentication: Use multi-method authentication to verify user identity and prevent unauthorized access.

  8. Cloud Resource Protection: Secure cloud resources to prevent unauthorized access, including strong authentication and encryption.

  9. Anti-Bot Protection: Use technologies to detect and prevent botnets, which can be used to distribute malware.

Cryptojacking Attacks in Cloud Native:

  1. Compromising Cloud Accounts: Hackers compromise cloud accounts to create distributed cryptomining workloads, targeting vulnerable and misconfigured resources.

  2. Examples of Hacker Groups:

    • Outlaw: Compromises Linux servers and IoT devices for DDoS attacks or mining Monero.
    • TeamTNT: Targets software service vulnerabilities for cryptojacking.
    • Kinsing: Exploits vulnerabilities, including the Log4j vulnerability, to compromise cloud native environments.

Securing Cloud Native Applications with Aqua Security:

  1. Aqua's Approach:

    • Modern Controls: Aqua replaces outdated signature-based approaches with modern controls based on cloud-native principles.
  2. Full Lifecycle Security:

    • Build Security: Detect and remediate security issues in artifacts early in the CI/CD pipeline.
    • Infrastructure Security: Enforce compliance and monitor configuration issues across public cloud services and Kubernetes clusters.
    • Workload Security: Protect applications in runtime with granular controls across VMs, containers, and serverless environments.
  3. Key Features:

    • Vulnerability Scanning: Scan CI pipelines, registries, and images for known vulnerabilities.
    • Dynamic Threat Analysis: Detect and mitigate hidden malware in container images using a secure sandbox.
    • Cloud Security Posture Management (CSPM): Continuously audit cloud accounts for security risks and auto-remediate misconfigurations.
    • Container Security: Set policies for image deployment, prevent the use of unapproved images, and enforce container immutability.

By following these best practices and leveraging advanced security solutions like Aqua, organizations can better protect themselves against the rising threat of cryptojacking in both traditional and cloud-native environments.

Cryptojacking: Impact, Attack Examples, and Defensive Measures (2024)

FAQs

What is an example of a cryptojacking attack? ›

Popular Examples of Cryptojacking Attacks

Coinhive was a cryptocurrency mining service that allowed website owners to monetize their websites by using their visitors' CPU power to mine the Monero cryptocurrency.

What are the solutions for cryptojacking? ›

Protecting against cryptojacking threat
  • Deploy a network monitoring solution.
  • Install an ad-blocking or anti-cryptomining extension on web browsers.
  • Use endpoint protection that is capable of detecting known cryptominers. ...
  • Keep web filtering tools up to date. ...
  • Maintain browser extensions.

How can we protect against cryptojacking? ›

Use ad-blockers—cryptojacking scripts are often embedded in web ads. Use an ad-blocker to block and detect malicious cyptomining code. Disable JavaScript—when surfing online, disable JavaScript to prevent cryptojacking code from infecting your organization's computers.

What helps defend against crypto worms and malware? ›

A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have. Well-designed antivirus protection has several characteristics. It checks any newly downloaded program to ensure that it is malware-free.

How does cryptojacking affect individuals? ›

One of the key symptoms of cryptojacking is decreased performance on your computing devices. Slower systems can be the first sign to watch out for, so be alert to your device running slowly, crashing, or exhibiting unusually poor performance.

What are the risks of cryptojacking? ›

Signs you could be a victim of cryptojacking
  • A noticeable slowdown in device performance.
  • Overheating of batteries on devices.
  • Devices shutting down due to lack of available processing power.
  • Reduction in productivity of your device or router.
  • Unexpected increases in electricity costs.

What is the goal of cryptojacking? ›

Cryptojacking, which is also referred to as malicious cryptomining, lets hackers mine cryptocurrency without paying for electricity, hardware and other mining resources. Cryptojacking malware often infects devices through standard phishing techniques.

Is cryptojacking illegal? ›

It's crucial to differentiate between legitimate cryptocurrency mining and cryptojacking. The former is a legal and intentional process where individuals or companies use their resources to mine cryptocurrencies. In contrast, cryptojacking is inherently non-consensual and illegal.

How can we reduce the environmental impact of crypto mining? ›

The results of this research are how to prevent and combat the negative impacts of cryptocurrency mining activities on the environment, including implementing several policies including minimizing greenhouse gas emissions, ensuring reliable energy, encouraging transparency and increasing environmental performance, data ...

How can cryptocurrency theft be prevented? ›

Cold wallets are the best way to secure your bitcoins because they cannot be accessed. Once you transfer your keys to cold storage, only transfer what you need to your hot wallet. Also, avoid custodial storage arrangements unless you need to use it for trading purposes or want limited insurance coverage.

How do I block crypto miners? ›

With AdBlock installed, you will be protected from any website that's trying to use your computer resources to mine for cryptocurrency without your consent.

How can cryptocurrency crime be prevented? ›

The following presents some best practices that may contribute to building a more secure and trustworthy crypto ecosystem, mitigating the risks associated with crypto crimes.
  1. Need for state-driven protective measures. ...
  2. Involvement of private entities. ...
  3. Capacity building. ...
  4. Enhancing transparency – the “Travel Rule”
Mar 14, 2024

What are two defensive measures that can be used against malware attacks? ›

How to prevent malware attacks
  • Patch and update software.
  • Use firewalls and security software, such as antimalware and antivirus.
  • Follow email security best practices.
  • Deploy email security gateways.
  • Avoid clicking links and downloading attachments.
  • Implement strong access control.
  • Require multifactor authentication.
Jun 26, 2024

What are 3 main ways to protect against malware? ›

How to prevent malware
  • Keep your computer and software updated. ...
  • Use a non-administrator account whenever possible. ...
  • Think twice before clicking links or downloading anything. ...
  • Be careful about opening email attachments or images. ...
  • Don't trust pop-up windows that ask you to download software. ...
  • Limit your file-sharing.

What is the most effective defense against malware? ›

10 malware protection best practices
  • Protect against malware. ...
  • Educate users on threat sources. ...
  • Partition your network. ...
  • Leverage email security. ...
  • Use security analytics. ...
  • Create a set of instructions for IT staff. ...
  • Practice prevention and remediation. ...
  • Deploy a zero-trust security framework.

What is an example of a crypto mining malware? ›

WannaMine does Bitcoin mining. This crypto-miner is a virus that distributes via EternalBlue and achieves longevity on a machine through the utilization of Windows Management Instrumentation (WMI) persistent event subscriptions.

What is cryptojacking involves? ›

Crpytojacking is a type of cyber-attack and is the process of ill-intended cryptomining. The menace works by embedding a befouled code into the targeted device and eradicating its resources to mine unauthorized cryptocurrency.

What is an example of crypto malware? ›

CryptoLocker is one of the most dangerous examples of crypto ransomware, a malicious program that encrypts everything on your device and demands you pay a ransom to have your data back. Coinhive. Coinhive was one of the best-known cryptojackers using JavaScript.

What is another word for cryptojacking? ›

Cryptojacking is also referred to as malicious cryptomining, and it is a threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.

Top Articles
Living Paycheck To Paycheck Statistics 2024
Linux Automount | Learn How Linux Automount Works? (Examples)
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Umn Biology
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6848

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.