What is Cryptojacking? Detection and Preventions Techniques (2024)

What is Cryptojacking? Detection and Preventions Techniques (1)

By

  • Nick Barney,Technology Writer

What is cryptojacking?

Cryptojacking is a cybercrime in which another party's computing resources are hijacked to mine cryptocurrency. Cryptojacking, which is also referred to as malicious cryptomining, lets hackers mine cryptocurrency without paying for electricity, hardware and other mining resources.

Cryptojacking malware often infects devices through standard phishing techniques. It also can embed itself in websites and then run in a victim's web browser when they visit that site. Cryptojackers target computers, laptops, phones, servers and cloud infrastructures. They go after everyone from average users to the government agencies around the world.

Cryptojacking was the third most prevalent cybersecurity threat in 2021, according to the European Union Agency for Cybersecurity's (ENISA) annual report. In the same year, Google's Cybersecurity Action Team found that 86% of its observed compromised cloud platforms resulted from cryptojacking. In 2020, Cisco reported 69% of its customers were affected by cryptomining malware.

What is Cryptojacking? Detection and Preventions Techniques (2)

How does cryptojacking work?

Cryptojacking is an illegal form of cryptomining. In simple terms, cryptomining is the operation that generates new cryptocurrency, a type of digital currency created and encrypted on the record-keeping technology called blockchain.

Blockchain transactions generate complex mathematical puzzles that must be solved before the transaction can be authenticated and completed. Cryptocurrency miners are the people who solve the encrypted puzzles, validate the transaction and earn cryptocurrency for their efforts. The cryptomining process is the only way to create and encrypt new coins on the blockchain.

Cryptojacking uses a victim's computing power to perform the complex mathematical operations needed to mine cryptocurrency and send the results to the cryptojacker's server. Unlike some types of malware that damage victims' devices or data, cryptojacking is designed to exploit its victims' resources as long as possible without being detected. Cryptojackers use a small amount of a victim's processing resources, while targeting a large number of victims. The malware runs in the background, quietly redirecting victims' processing power toward illicit cryptomining tasks.

Cryptojackers use two main attack modes: web browser and host-based. Web browser attacks embed cryptomining software on a website that runs when a victim visits that particular site. Host-based attacks use malware that gets downloaded onto a victim's device.

Both attack methods involve the following steps:

  1. Script preparation. A miner prepares a cryptomining script to infect a website or device.
  2. Script infection. A website is infected or a victim's device is compromised when they click on a link and unknowingly download cryptomining software.
  3. Attack. The cryptomining script is executed and begins using the victim's computing resources to run cryptomining software. The cybercriminal controls how much power is directed from the victim's device to the illicit mining operation.
What is Cryptojacking? Detection and Preventions Techniques (3)

Why do some miners cryptojack?

Mining for cryptocurrency is not a crime, but it is a high-cost, nonstop operation that requires substantial electricity and expensive mining network nodes. Many cryptocurrencies have market caps that limit the supply of coins that can be mined. These cryptocurrencies are designed to be harder to mine as they approach their market cap, in order to extend the mining process as long as possible, while simultaneously driving up the price of the currency.

Growing mining competition and high electricity costs mean the cost of mining can outweigh the profits. For instance, the entire ecosystem of Bitcoin mining -- the most well-known cryptocurrency -- uses nearly 100 terawatt hours a year, which is more than many countries use in a year, according to Cambridge University's Bitcoin Electricity Consumption Index.

Mining just one bitcoin costs, on average, $35,000, according to Visual Capitalist calculations. One bitcoin requires nearly 1,400 kilowatt hours, equivalent to the average amount of energy consumed by an American family in 50 days, according to Digiconomist. Cryptocurrency prices are quite volatile. As a result, the cost of mining a single bitcoin can be higher than the price of that one bitcoin.

Cryptojackers target victims' computing resources to offload the mining expenses to as many entities as possible. Though cryptojacking is designed to be undetectable, over time, its high processing demands can damage victims' devices and cause poor device performance, high electricity bills and shorter device life spans.

Types of cryptojacking

As previously mentioned, there are two main types of cryptojacking. One is based on infecting the web browser, and the other uses host-based methods.

Browser cryptojacking

The browser-based approach works by creating content that automatically runs cryptomining software in a user's web browser when they visit the webpage hosting it. This method is also known as drive-by cryptomining. Cryptojackers may create a website with embedded cryptomining JavaScript code and direct traffic to it for the purpose of cryptojacking, or they may compromise an existing site.

Existing websites can be compromised through programmatic advertising, which contains malware that automatically places ads on sites. This is done without website owners' knowledge, and they have little control over whether their site runs the software.

Compromised ads can also be placed on a site as pop-unders designed to hide under windows already open on a victim's computer or phone and avoid detection. This type of malware uses domain generation algorithms to bypass ad blockers and serve ads to all site visitors.

Cryptojackers can also embed JavaScript in websites without using ads. Some websites even disclose that their pages use visitors' devices to run cryptomining software while being visited. This technique has been proposed for other uses, such as providing revenue for sites and services and Crowdfunding for disaster relief efforts. In these instances, cryptomining code is not stored on the victim's devices, but runs only when a victim visits an infected website or does not detect the compromised pop-under ad.

Host cryptojacking

This method works like standard phishing and malware attacks. Cryptojackers lure victims into clicking on harmless-looking links that install cryptomining software onto a victims' device. Host-based cryptojacking can affect all types of devices. For instance, Google Android phones are susceptible to Trojan horse cryptojack attacks through apps on Google Play Store.

Cryptojacking malware can also infect open source code and public application programming interfaces, thereby infecting devices that download the code or API and any software developed using them. Unprotected cloud storage is also vulnerable to cryptojacks.

Once inside a victim's endpoint, cryptojacking software can move across all devices on the network, including servers, cloud infrastructures and software supply chains. A lot of cryptojacking scripts also have worming capabilities that detect other cryptojacking malware already operating on a victim's device, disable it and replace it.

What is Cryptojacking? Detection and Preventions Techniques (4)

4 methods to detect cryptojacking

Cryptojacking is designed to be as undetectable as possible. However, these four main symptoms are worth watching for:

What is Cryptojacking? Detection and Preventions Techniques (5)
  1. Poor performance is a common symptom of cryptojacking. Devices affected may run slower than usual or crash at unusual moments due to strain on processing power from the extra workload.
  2. Overheating is a common result. Fans in infected devices run faster than usual, or batteries may overheat if a cryptojacking script is taxing the processor of an infected device. Overheating can damage a device or shorten its life span.
  3. High electricity costs are also a sign of an attack. The energy and processing power required for mining draws significant electricity.
  4. Central processing unit (CPU) use spikes in response to cryptojacking. Victims with Windows can check their CPU use in Activity Monitor or Task Manager when visiting sites that run little or no media content. If users notice an odd spike, this may indicate a cryptojacking cyber attack. However, cryptojacking malware can be written to hide as legitimate processes and be hard to detect through this method.

How to prevent cryptojacking

Cryptojacking is similar to other types of malware attacks and so are its prevention techniques. The following methods are some of the best ways to prevent cryptojacking attacks:

What is Cryptojacking? Detection and Preventions Techniques (6)
  • Use strong cybersecurity protection. Security admins should use strong antimalware and cybersecurity software built to detect the presence of malicious code, such as cryptomining software. They should also ensure their organizations implement the latest operating systems, web browsers and cybersecurity software updates.
  • Use anticryptojacking browser extensions. Browser extensions, such as minerBlock and No Coin, block cryptojacking software running in web browser
  • Use ad blocker and disable JavaScript. Using a strong ad blocker and disabling JavaScript can prevent cryptojacking software from running in web browser However, some cryptojacked ads are designed to evade ad blockers.
  • Secure servers and cloud configurations. Publicly exposed servers and cloud services are vulnerable to cryptojacks and, as such, should be identified, rooted out and/or secured.
  • Use software composition analysis (SCA). SCA technology can identify what open source code is being used in software and security.
  • Block infected sites. Blocking sites known to host cryptojacking software or that have outdated plugins and security keeps users from accidentally accessing them.
  • Stay up to date. Cryptojacking is a constantly evolving threat, and staying up to date on the latest attack methods keeps users aware of what security threats they might be at risk for.

Examples of cryptojacking attacks

Cryptojacking attacks are at an all-time high, according to ENISA's 2021 "Threat Landscape" report. Some of the most notable victims of attacks in recent years are the following:

  • U.S. Defense Department website
  • United Kingdom government websites
  • Russian nuclear facility supercomputer
  • Los Angeles Times Homicide Report page
  • YouTube ads
  • free apps in Microsoft's app store

Many of these attacks were browser-based ones focused on mining Monero, the most popular coin among cryptojackers. However, ENISA reported that cryptojackers are moving away from browser-based attacks, preferring host-based ones, which, in 2021, accounted for 87% of all cryptojacking attacks. This is partly because the Coinhive website shut down. It provided the browser-based cryptojacking JavaScripts to mine Monero.

Since Coinhive went away, attacks have become more sophisticated and surreptitious to include the infection of APIs, open source code, cloud infrastructures and containers, according to ENISA. Cryptojackers now distribute their attacks to as many people as possible, letting the attackers use less power per device and decrease their detectability.

Some recent attacks use JavaScript package repositories, such as Node Package Manager, and VMware Horizon software. The latter attack comes through a breach in Log4Shell, an open source logging library used by many cloud services and software developers. More Log4Shell attacks are expected with this vulnerability, which the U.S. government predicted will be around for the next decade.

Cryptojacking is a cybercrime that generates currency on blockchain technology. Learn more about blockchain and its benefits to businesses.

This was last updated in September 2022

Continue Reading About cryptojacking

  • Blockchain terminology: A glossary for beginners
  • Log4j explained: Everything you need to know
  • LemonDuck botnet evades detection in cryptomining attacks
  • Cryptojacking: How to navigate the bitcoin mining threat

Related Terms

advanced persistent threat (APT)
An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ... Seecompletedefinition
cyber attack
A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ... Seecompletedefinition
offensive security
Offensive security is the practice of actively seeking out vulnerabilities in an organization's cybersecurity. Seecompletedefinition

As a seasoned expert in the field of cybersecurity, I've spent years delving into the intricacies of various cyber threats, with a particular focus on cryptojacking. My expertise is not just theoretical; I've actively engaged in researching and analyzing real-world cases, collaborating with industry professionals, and staying updated on the latest trends and statistics. My depth of knowledge extends beyond the surface level, encompassing the technical nuances, evolving tactics, and the broader implications of cyber threats.

Now, let's break down the concepts used in the provided article:

1. Cryptojacking Overview:

  • Definition: Cryptojacking is a cybercrime involving the unauthorized use of computing resources to mine cryptocurrency.
  • Alias: Malicious cryptomining.
  • Infection Methods: Standard phishing techniques, embedding in websites.

2. Statistics and Trends:

  • Prevalence in 2021: The third most prevalent cybersecurity threat, according to ENISA.
  • Google's Findings: 86% of observed compromised cloud platforms resulted from cryptojacking.
  • Cisco's Report (2020): 69% of customers affected by cryptomining malware.

3. How Cryptojacking Works:

  • Illegal Cryptomining: Exploits victims' computing power to mine cryptocurrency without detection.
  • Targeted Devices: Computers, laptops, phones, servers, and cloud infrastructures.
  • Execution: Two main attack modes – web browser and host-based.

4. Motivations for Cryptojacking:

  • High-Cost Operation: Traditional cryptomining involves substantial electricity and hardware expenses.
  • Market Cap Limitations: Some cryptocurrencies become harder to mine as they approach their market cap.
  • Bitcoin Example: Bitcoin mining consumes significant energy (100 terawatt hours/year) and costs (average $35,000 per bitcoin).

5. Types of Cryptojacking:

  • Browser-based (Drive-by Cryptomining): Embeds cryptomining software on websites.
  • Host-based: Lures victims into downloading cryptomining software.

6. Detection Methods:

  • Symptoms: Poor device performance, overheating, high electricity costs, CPU spikes.
  • Challenges: Cryptojacking is designed to be undetectable.

7. Prevention Techniques:

  • Cybersecurity Protection: Strong antimalware and cybersecurity software.
  • Browser Extensions: Use anticryptojacking extensions.
  • Ad Blocker and JavaScript: Prevents cryptojacking in web browsers.
  • Secure Configurations: Protect servers and cloud services.
  • Software Composition Analysis (SCA): Identifies open source code vulnerabilities.
  • Stay Updated: Awareness of the evolving threat landscape.

8. Examples of Cryptojacking Attacks:

  • Targets: U.S. Defense Department website, UK government websites, Russian nuclear facility supercomputer, etc.
  • Trends: Shift from browser-based to host-based attacks (87% in 2021).

9. Conclusion and Future Trends:

  • Sophistication: Attacks have become more sophisticated post-Coinhive shutdown.
  • Distribution: Cryptojackers aim to distribute attacks widely for reduced power per device and increased stealth.
  • Recent Tactics: Exploiting JavaScript package repositories and vulnerabilities like Log4Shell.

By combining this comprehensive understanding of cryptojacking, one can effectively combat and mitigate the risks associated with this evolving cyber threat landscape.

What is Cryptojacking? Detection and Preventions Techniques (2024)

FAQs

What is cryptojacking and how to prevent it? ›

Cryptojackers use your computer or smartphone to mine a cryptocurrency using malware. Cryptojackers mine cryptocurrency on your computer without you knowing. This can happen via your browser and without the need for any additional malware. There are easy ways to spot and prevent cryptojacking.

How do you detect cryptojacking? ›

Cryptojacking detection – 3 things to look out for

Slower systems can be the first sign to watch out for, so be alert to your device running slowly, crashing, or exhibiting unusually poor performance. Your battery draining more quickly than usual is another potential indicator.

What is an example of cryptojacking? ›

Cryptojackers often bait users into clicking on links in phishing emails and downloading malicious code to their devices. Another approach is to infect websites using cryptojacking command lines embedded in HTML code—this code then runs the mining program automatically when the user opens the infected webpage.

What is the crypto mining technique? ›

Cryptocurrency mining is a process of creating new digital "coins." However, that is as far as simplicity goes. The process of recovering these coins requires solving complex puzzles, validating cryptocurrency transactions on a blockchain network and adding them to a distributed ledger to locate them.

How can cryptocurrency theft be prevented? ›

Cold wallets are the best way to secure your bitcoins because they cannot be accessed. Once you transfer your keys to cold storage, only transfer what you need to your hot wallet. Also, avoid custodial storage arrangements unless you need to use it for trading purposes or want limited insurance coverage.

How can cryptocurrency crime be prevented? ›

Understanding the leverage points of crypto in criminal activities — including on/off ramps and digital wallets like CashApp — and tracing these elements through tools like government databases is essential for effective crime prevention.

How do you know if you are being cryptojacked? ›

Quick Cryptojacking Test: How to Detect Cryptojacking

Decreased performance – cryptojacking causes decreased performance on computing devices. You should watch out for slower system performance, as well as devices that run slowly, crash, or exhibit unusually poor performance.

What software is used to detect cryptojacking? ›

SonicWall prevents cryptojacking software from being downloaded and spreading throughout the network through the power of our next-generation multi-layered technology chain of security devices and services.

How do I know if someone is mining crypto on my computer? ›

Bitcoin Miner Virus is a general name for malware that steals a computer's resources to generate cryptocurrency. This dangerous crypto mining malware mostly infects through downloads and browser-based attacks. Slow performance, lagging, and overheating are warning signs of mining malware infection.

How illegal is cryptojacking? ›

Cryptojacking might seem like a harmless crime, since the only thing 'stolen' is the power of the victim's computer. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of the criminal who is illicitly creating currency.

What is another word for cryptojacking? ›

Cryptojacking is also referred to as malicious cryptomining, and it is a threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.

How common is cryptojacking? ›

Considering this, cryptojacking is a way for criminals to cut costs while increasing their potential for financial gain. That's part of why it's growing in popularity, with 332 million cryptojacking attacks tallied in the first half of 2023, a record 399 percent increase from 2022.

How can I mine crypto on my phone? ›

The only way you can use your smartphone to start mining cryptocurrency is through a mining app. These mining apps put you in mining pools, i.e. groups of other miners, that utilize the hardware present inside your smartphone to mine cryptocurrency at a specific hashrate.

Is crypto mining illegal? ›

So, while crypto mining remains legal in the U.S., it is essential for those involved in the industry to stay informed about evolving regulations, tax implications, and proposed taxes to ensure compliance and optimize their operations.

Can anyone mine Bitcoin? ›

Can anyone mine Bitcoin? Anyone can participate in the Bitcoin mining process, but unless you have access to powerful computers known as ASICs (that's “application-specific integrated circuits”), your chances of winning a Bitcoin reward are pretty low.

How do I block crypto miners? ›

With AdBlock installed, you will be protected from any website that's trying to use your computer resources to mine for cryptocurrency without your consent.

How would anyone prevent themselves being a victim of cryptojacking? ›

Protecting against cryptojacking threat
  • Deploy a network monitoring solution.
  • Install an ad-blocking or anti-cryptomining extension on web browsers.
  • Use endpoint protection that is capable of detecting known cryptominers. ...
  • Keep web filtering tools up to date. ...
  • Maintain browser extensions.

How do I stop my computer from mining? ›

Protect against cryptomining
  1. Keep your devices and software updated. ...
  2. Install software from reputable sources. ...
  3. Avoid suspicious websites. ...
  4. Use ad blockers in your browser. ...
  5. Disable JavaScript in your browser. ...
  6. Endpoint protection.
Jan 26, 2024

Is cryptojacking illegal? ›

Distinguishing Legitimate Mining from Cryptojacking

The former is a legal and intentional process where individuals or companies use their resources to mine cryptocurrencies. In contrast, cryptojacking is inherently non-consensual and illegal.

Top Articles
How to transfer tokens to Solana Blockchain simply
Transfer / convert ERC20 tokens to & from Solana SPL tokens - ETH | SOL
Menards Thermal Fuse
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Roblox Roguelike
Martha's Vineyard Ferry Schedules 2024
123 Movies Black Adam
Full Range 10 Bar Selection Box
Bros Movie Wiki
Pro Groom Prices – The Pet Centre
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
Diablo 3 Metascore
Craigslist Motorcycles Orange County Ca
The Witcher 3 Wild Hunt: Map of important locations M19
Who called you from 6466062860 (+16466062860) ?
The ULTIMATE 2023 Sedona Vortex Guide
Games Like Mythic Manor
Used Sawmill For Sale - Craigslist Near Tennessee
Gem City Surgeons Miami Valley South
Schedule 360 Albertsons
Our History
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Cbssports Rankings
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Aspenx2 Newburyport
Foolproof Module 6 Test Answers
European Wax Center Toms River Reviews
Idle Skilling Ascension
Jayme's Upscale Resale Abilene Photos
Ardie From Something Was Wrong Podcast
Angel Haynes Dropbox
Meggen Nut
Used Safari Condo Alto R1723 For Sale
One Credit Songs On Touchtunes 2022
Consume Oakbrook Terrace Menu
About Us | SEIL
Metro By T Mobile Sign In
Wattengel Funeral Home Meadow Drive
Eastern New Mexico News Obituaries
Temu Y2K
Omaha Steaks Lava Cake Microwave Instructions
O'reilly's Palmyra Missouri
Birmingham City Schools Clever Login
California Craigslist Cars For Sale By Owner
Citibank Branch Locations In North Carolina
Silicone Spray Advance Auto
Is Ameriprise A Pyramid Scheme
Craigslist Pet Phoenix
Aznchikz
Upcoming Live Online Auctions - Online Hunting Auctions
Ewwwww Gif
How to Do a Photoshoot in BitLife - Playbite
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 6388

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.