Cryptojacking
back.keyissues
Cryptojacking is an emerging cyberthreat involving cyber criminals hijacking third-party home or work computers to mine for cryptocurrency
Main Types of Cryptojacking Execution
File-Based Cryptojacking:
Executed using manipulative methods to access the infrastructure of a computer. Such methods contain executable downloadable files that run scripts in the background, quietly mining cryptocurrency.
Browser-Based Cryptojacking:
Occurs within common browsers such as Google Chrome, Mozilla and Safari. Hackers create a croptomining script embedded directly into thr websites accessed from the corrupt browser.
Cloud Cryptojacking:
Done through accessing and hacking cloud services, in which hackers can use computer resources to initiatie mining cryptocurrency; leading to steep increases in electricity and computer power consumption.
What can I do?
Knowing how to identify cryptojacking attacks, and reacting accordingly, plays a key role in preventing such attacks.

Advice
Learn to detect cryptojacking attacks:
- An unjustified increase in power consumption and electribity bills is a potential sign of being a victim of a cyptojacking attack
- Monitor disruption in device sleep mode which are generally altered by cryptojacking attackers to optimize cryptojacking mining duration
- Monitor computer activity and performance in case of cryptomining-level CPU activity as this is a possible sign of illicit cryptomining activity on the device
Take steps to protect your devices:
- Download protective browser extensions that protect againt browser-based cryptomining and provides warnings when malicious codes are deteced.
- Check command lines for cryptocurrency miners and implement a firewall
- Install antivirus software
Contact the relevant authorities:
- Seek professional guidance
- Report suspicious to the relevant authorities for further inspection
