Cryptojacking

back.keyissues
Cryptojacking

Cryptojacking is an emerging cyberthreat involving cyber criminals hijacking third-party home or work computers to mine for cryptocurrency

Main Types of Cryptojacking Execution

File-Based Cryptojacking:

Executed using manipulative methods to access the infrastructure of a computer. Such methods contain executable downloadable files that run scripts in the background, quietly mining cryptocurrency. 

Browser-Based Cryptojacking:

Occurs within common browsers such as Google Chrome, Mozilla and Safari. Hackers create a croptomining script embedded directly into thr websites accessed from the corrupt browser.

Cloud Cryptojacking:

Done through accessing and hacking cloud services, in which hackers can use computer resources to initiatie mining cryptocurrency; leading to steep increases in electricity and computer power consumption. 

What can I do?

Knowing how to identify cryptojacking attacks, and reacting accordingly, plays a key role in preventing such attacks.

Advice
Advice

Learn to detect cryptojacking attacks:

  • An unjustified increase in power consumption and electribity bills is a potential sign of being a victim of a cyptojacking attack
  • Monitor disruption in device sleep mode which are generally altered by cryptojacking attackers to optimize cryptojacking mining duration
  • Monitor computer activity and performance in case of cryptomining-level CPU activity as this is a possible sign of illicit cryptomining activity on the device

 

Take steps to protect your devices:

  • Download protective browser extensions that protect againt browser-based cryptomining and provides warnings when malicious codes are deteced.
  • Check command lines for cryptocurrency miners and implement a firewall
  • Install antivirus software 

 

Contact the relevant authorities:

  • Seek professional guidance 
  • Report suspicious to the relevant authorities for further inspection
Shield Icon