Meaning And Definition
Cryptojacking is a type of cybercrime that involves the unauthorized use of people’s devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency. Like many forms of cybercrime, the motive is profit, but unlike other threats, it is designed to stay completely hidden from the victim.
What is Cryptojacking?
Cryptojacking is a threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency. Cryptocurrency is digital or virtual money, which takes the form of tokens or “coins.” The most well-known is Bitcoin, but there are approximately 3,000 other forms of cryptocurrency and while some cryptocurrencies have ventured into the physical world through credit cards or other projects — most remain virtual.
Cryptocurrencies use a distributed database, known as blockchain to operate. The blockchain is regularly updated with information about all the transactions that took place since the last update. Each set of recent transactions is combined into a block using a complex mathematical process.
To produce new blocks, cryptocurrencies rely on individuals to provide computing power. Cryptocurrencies reward people who supply computing power with cryptocurrency. Those who trade computing resources for currency are called “miners”.
The larger cryptocurrencies use teams of miners running dedicated computer rigs to complete the necessary mathematical calculations. This activity requires a significant amount of electricity – for example, the Bitcoin network currently uses more than 73TWh of energy per year.
Cryptojackers And The Future Of Cryptojacking
That is where cryptojacking comes in: cryptojackers are people who want the benefits of cryptocurrency mining without incurring huge costs. By not paying for expensive mining hardware or large electricity bills, cryptojacking allows hackers to mine for cryptocurrency without the large overheads. The type of cryptocurrency primarily mined on personal computers is Monero, which appeals to cybercriminals because it is difficult to trace.
There is some debate as to whether cryptojacking is in decline or on the rise. Cryptojacking tends to rise in proportion to the value of cryptocurrencies, particularly Bitcoin and Monero. But in recent years, two factors have had a dampening effect on cryptojacking:
- Crackdowns by law enforcement.
The motivation behind a cryptojacking attack is simple: money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging without the means to cover large costs. Cryptojacking is the criminal manifestation of crypto mining and offers an illegitimate yet effective and inexpensive way to mine valuable coins.
How Does Cryptojacking Work?
Cybercriminals hack into devices to install cryptojacking software. The software works in the background, mining for cryptocurrencies or stealing from cryptocurrency wallets. The unsuspecting victims use their devices typically, though they may notice slower performance or lags.
Hackers have two primary ways to get a victim’s device to secretly mine cryptocurrencies:
- By getting the victim to click on a malicious link in an email that loads crypto mining code on the computer
Hackers often use both methods to maximize their returns. In both cases, the code places the cryptojacking script onto the device, which runs in the background as the victim works. Whichever method is used, the script runs complex mathematical problems on the victims’ devices and sends the results to a server which the hacker controls.
Unlike other types of malware, cryptojacking scripts do not damage computers or victims’ data. However, they do steal computer processing resources. For individual users, slower computer performance might simply be an annoyance. But cryptojacking is an issue for businesses because organizations with many cryptojacked systems incur real costs. For example:
- The use of help desk and IT time spent tracking down performance issues and replacing components or systems in the hope of solving the problem.
- Increased electricity costs.
Some crypto-mining scripts have worming capabilities that allow them to infect other devices and servers on a network. This makes them harder to identify and remove. These scripts may also check to see if the device is already infected by competing for crypto-mining malware. If another crypto miner is detected, the script disables it.
Malicious versions of crypto mining – i.e. cryptojacking – don’t ask for permission and keep running long after you leave the initial site. This is a technique used by owners of dubious sites or hackers who have compromised legitimate sites. Users have no idea that a site they visited has been using their computer to mine cryptocurrency. The code uses just enough system resources to remain unnoticed. Although the user thinks the visible browser windows are closed, a hidden one stays open. Often it can be a pop-under, which is sized to fit beneath the taskbar or behind the clock.
Cryptojacking can even infect Android mobile devices, using the same methods that target desktops. Some attacks occur through a Trojan hidden in a downloaded app. Or users’ phones can be redirected to an infected site, which leaves a persistent pop-under. While individual phones have the relatively limited processing power, when attacks occur in large numbers, they provide enough collective strength to justify the cryptojackers’ efforts.
How to Detect Cryptojacking
Cryptojacking detection can be difficult because the process is often hidden or made to look like a benevolent activity on your device. However, here are three signs to watch out for:
Cryptojacking Detection – 3 Things to Look Out For
- Decreased performance: One of the key symptoms of cryptojacking is decreased performance on your computing devices. Slower systems can be the first sign to watch out for, so be alert to your device running slowly, crashing, or exhibiting unusually poor performance. Your battery draining more quickly than usual is another potential indicator.
- Overheating: Cryptojacking is a resource-intensive process that can cause computing devices to overheat. This can lead to computer damage or shorten their lifespan. If your laptop or computer’s fan is running faster than usual, this could indicate that a cryptojacking script or website is causing the device to heat up, and your fan is running to prevent melting or fire.
- Central Processing Unit (CPU) usage: If you see an increase in CPU usage when you are on a website with little or no media content, it could be a sign that cryptojacking scripts might be running. A good cryptojacking test is to check the central processing unit (CPU) usage of your device using the Activity Monitor or Task Manager. However, bear in mind that processes might be hiding or masking as something legitimate to hinder you from stopping the abuse. Also, when your computer is running at maximum capacity, it will run very slowly, and therefore can be harder to troubleshoot.
How To Protect Yourself Against Cryptojacking
Use a Good Cybersecurity Program:
A comprehensive cybersecurity program will help to detect threats across the board and can provide cryptojacking malware protection. As with all other malware precautions, it is much better to install security before you become a victim. It is also good practice to install the latest software updates and patches for your operating system and all applications — especially those concerning web browsers.
Be Alert to The Latest Cryptojacking Trends:
Cybercriminals are constantly modifying code and coming up with new delivery methods to embed updated scripts onto your computer system. Being proactive and staying on top of the latest cybersecurity threats can help you detect cryptojacking on your network and devices and avoid other types of cybersecurity threats.
Use Browser Extensions Designed to Block Cryptojacking:
Cryptojacking scripts are often deployed in web browsers. You can use specialized browser extensions to block cryptojackers across the web, such as miner block, No Coin, and Anti Miner. They install as extensions in some popular browsers.
Since cryptojacking scripts are often delivered through online ads, installing an ad blocker can be an effective means of stopping them. Using an adblocker like AdBlocker Plus can both detect and block malicious cryptojacking code.
Block Pages That Are Known to Deliver Cryptojacking Scripts
To prevent cryptojacking while visiting websites, make sure each site you visit is on a carefully vetted whitelist. You can also blacklist sites known for cryptojacking, but this may still leave your device or network exposed to new cryptojacking pages.
Cryptojacking might seem like a relatively harmless crime since the only thing ‘stolen’ is the power of the victim’s computer. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of criminals who are illicitly creating currency. We recommend following good cybersecurity practices to minimize the risks and to install trusted cybersecurity or internet security onto all of your devices.