What is Cryptojacking? Crypto Mining Hijacking Examples | Darktrace (2024)

Darktrace Glossary>Cryptojacking

Contents

How is cryptojacking different from cryptocurrency mining?
How do cryptocurrency mining cryptojacking relate?
How does crypto mining work?
What are the typical signs of cryptojacking?
What are security risks associated with cryptocurrency mining?
How do cryptojackers compromise devices for mining and what resource is often compromised?
What is the significance of anti-mining VPNs in preventing cryptojacking attacks?
What methods and techniques do cryptojackers employ to evade detection?
Who are common targets for cryptojacking? How can individuals and organizations protect themselves from cryptojacking?
How can security solutions help detect and mitigate cryptojacking attempts?

How is cryptojacking different from cryptocurrency mining?

Cryptojacking is the unauthorized use of a computer or device’s processing power to mine cryptocurrencies, often without the owner’s consent or knowledge. Cryptojacking is considered a form of cybercrime.

In contrast, traditional cryptocurrency mining is a legitimate process where miners invest their own hardware and resources to voluntarily mine cryptocurrency.

How do cryptocurrency mining cryptojacking relate?

Cryptocurrency mining is the process of validating and recording transactions on a blockchain through complex mathematical computations. Miners use their computational power to solve these cryptographic puzzles, and in return, are rewarded with cryptocurrency.

With the most popular cryptocurrency Bitcoin reaching a peak of $66,000 in 2021, crypto mining can be extremely lucrative. However, the mining process typically consumes large amounts of computational power and electricity, drastically increasing the costs of mining.

As such, cryptojackers essentially steal computing and energy resources for mining to reduce their costs and increase their “profits” earned from cryptocurrency mining. In 2022, it was estimated that cryptojackers used $53 worth of system resources for every $1 that was mined.

How does crypto mining work?

Cryptocurrency is a form of digital currency that is based on the principles of complex mathematical encryption. They are transacted on a decentralized distributed ledger known as a blockchain.

Without a centralized governing body, transactions made on the blockchain have to be approved by miners who solve cryptographic puzzles to validate them. This process is known as “crypto mining” and requires a large amount of computational power. Thus, the first miner to solve the puzzle is rewarded with cryptocurrency for their efforts.

The primary components of crypto mining include:

Blockchain

The underlying distributed ledger technology where transactions are recorded and validated.

Mining software

Specialized software that connects miners to the cryptocurrency network and manages mining tasks.

Mining hardware

Devices equipped with powerful CPUs, GPUs or ASICs (Application-Specific Integrated Circuits) for efficient computations.

Mining pool

Miners can join mining pools to combine resources and share rewards, reducing their variance in earnings.

Cryptocurrency wallet

A digital wallet to store and manage earned cryptocurrencies.

What are the typical signs of cryptojacking?

Common signs of cryptojacking include:

  • Reduced performance: Device has unusually slow performance, is overheating, has increased fan activity, or faster battery drainage.
  • Increased energy consumption: Device is consuming more electricity than usual which may also lead to increased electricity bills.
  • Elevated CPU/GPU usage: Monitoring Task Manager or Activity Monitor may reveal unusually high CPU/GPU utilization. Applications or software may also crash more frequently due to excessive CPU/GPU usage.

What is Cryptojacking? Crypto Mining Hijacking Examples | Darktrace (1)

What are security risks associated with cryptocurrency mining?

Cryptocurrency mining can also be done on mobile devices through Android applications. However, there are certain risks associated with cryptocurrency mining:

Battery drain and overheating

Continuous mining can rapidly deplete a device’s battery and cause overheating, potentially damaging the hardware.

Data privacy concerns

Applications may be able to access data and information from the device or other applications.

Embedded malware

These applications or software may also contain malware.

Fraud and scams

Some applications are fake and aim to scam users by making them pay a fee to “mine cryptocurrency”.

How do cryptojackers compromise devices for mining and what resource is often compromised?

Cryptojackers often compromise a device’s CPU/GPU power through:

Browser injections

Inject Javascript-based cryptojacking scripts into websites which run when users visit the website.

Phishing attacks

Trick users into downloading mining software through phishing emails.

Supply chain attacks

Attackers can embed cryptomining scripts into open-source code repositories.

Unsecure cloud infrastructure

Cryptojackers can hijack cloud infrastructure which may have exposed APIs or allow unauthenticated access.

Certain cryptojacking malware also have worm-like propagation capabilities, allowing the malware to move laterally through the network and infect even more devices to be exploited for cryptomining.

What is the significance of anti-mining VPNs in preventing cryptojacking attacks?

Anti-mining VPNs are designed to detect and block connections to known cryptojacking servers and websites. They help prevent cryptojacking by blocking the communication channels between the victim device and the attacker’s mining pool, thus stopping the unauthorized use of resources.

What methods and techniques do cryptojackers employ to evade detection?

Cryptojackers employ various evasion techniques, such as:

Fileless Malware

Avoiding traditional file-based detections.

Encrypted traffic

Encrypt mining traffic to bypass network detection features.

Mining pool proxy

To hide the actual mining pool destination.

Who are common targets for cryptojacking? How can individuals and organizations protect themselves from cryptojacking?

Cryptojacking attacks commonly target:

Websites

Cryptojackers are able to inject mining scripts into poorly secured websites, which will mine cryptocurrency within the user’s browser when the website is visited.

End-user devices

Devices such as laptops, desktops, smartphones, and IoT devices can be targeted by cryptojackers for their computing power.

Cloud infrastructure

Cryptojackers are also taking advantage of the scalability of cloud instances.

Protection from such attacks involves:

Security software

Use anti-virus and anti-malware software which may be able to detect and remove any unwanted programs.

Ad-blockers

Block malicious ads that host mining scripts.

Regular updates and patches

Keep software and operating systems updated to prevent exploitation of known vulnerabilities. For example, Darktrace DETECTidentified a crypto-mining campaign which exploited a Log4j vulnerability.

Security awareness and training

Educate users to recognize phishing emails and avoid clicking on links or downloading attachments from such emails.

How can security solutions help detect and mitigate cryptojacking attempts?

Security solutions can:

Anti-malware software

Scan for and remove cryptojacking malware.

Block malicious domains

Prevent communication with known cryptojacking servers

Behavioral analysis

Identify unusual patterns indicative of cryptojacking. In 2022, Darktrace DETECT observed anomalous activity from a device during a cryptojacking attack.

Email security gateways

Email security solutions such as Darktrace/Email can help to stop phishing attempts in their tracks, preventing cryptojacking malware from being downloaded on to devices.

Vulnerability management

Alert security teams of known vulnerabilities that should be patched.

What’s a Rich Text element?

The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.

Static and dynamic content editing

A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!

How to customize formatting for each rich text

Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.

Related glossary terms

This is some text inside of a div block.

Featured Resources

View all resources

Data SheetWhy Darktrace?
BlogBuilding for the AI Attack Era
BlogUsing AI to Help Humans Function Better During a Cyber Crisis
White PaperA CISO's Guide to Incident Management

Disover Darktrace lorum ipsum dolor sit amet

Discover Darktrace Products

Start your free trial

What is Cryptojacking? Crypto Mining Hijacking Examples | Darktrace (2024)

FAQs

What is Cryptojacking? Crypto Mining Hijacking Examples | Darktrace? ›

Cryptojacking is the unauthorized use of a computer or device's processing power to mine cryptocurrencies, often without the owner's consent or knowledge. Cryptojacking is considered a form of cybercrime.

What is an example of cryptojacking? ›

Cryptojacking News: Real-world Examples

When visitors went to the Homicide Report page, their devices were used to mine Monero. It took awhile for the threat to be detected because the amount of computing power the script used was decreased, so users would not be able to tell their device had been enslaved.

What are signs of cryptojacking? ›

Signs you could be a victim of cryptojacking
  • A noticeable slowdown in device performance.
  • Overheating of batteries on devices.
  • Devices shutting down due to lack of available processing power.
  • Reduction in productivity of your device or router.
  • Unexpected increases in electricity costs.

How to know if someone is mining crypto? ›

Is your PC Infected with a Crypto Miner? Here's How to Find Out
  1. High CPU or GPU Usage. ...
  2. Increased fan noise and overheating. ...
  3. Decrease in performance. ...
  4. Unexplained Network Activity. ...
  5. Crashes and more crashes. ...
  6. Short battery life. ...
  7. Unknown Processes in Task Manager. ...
  8. Blocked access to system monitoring tools.
Jun 12, 2024

How does cryptojacking affect individuals? ›

If cryptojacking infects a device, it will create problems such as loss of productivity and additional expenses: as technical help will be needed or even computer replacement.

How do you detect cryptojacking? ›

With cryptojacking, memory usage would also spike. In addition to high resource usage, overheating is another sign of cryptojacking. For known cryptojacking malware, antivirus software will detect it before the malware runs on the local computer.

Is cryptojacking illegal? ›

Is cryptomining a crime? No, cryptomining is not a crime. Stealing electricity to illegally mine cryptocurrency for personal gain, however, is a crime known as cryptojacking.

How do you prevent cryptojacking? ›

Use an ad-blocker to block and detect malicious cyptomining code. Disable JavaScript—when surfing online, disable JavaScript to prevent cryptojacking code from infecting your organization's computers. Remember that disabling JavaScript will also block some of the functions you require when browsing.

What does a crypto mining computer look like? ›

A GPU mining rig can look like a regular personal computer, but it typically has several GPUs (Graphics Processing Units) connected to its motherboard. These rigs require a compatible motherboard, sufficient power supply, cooling systems, and often specialized software to manage and optimize the mining process.

Can you use your phone to mine crypto? ›

Does Bitcoin Mining Work on a Smartphone? Yes, it is possible to mine Bitcoin on a smartphone, whether you have an Android device or an iPhone. Since phones are essentially computers, they can be set to the task of computing hashes. A hash is a one-way transformation of data.

How can you tell if someone is a crypto scammer? ›

Signs of crypto scams include poorly written white papers, excessive marketing pushes, and get-rich-quick claims. Regulatory agencies, such as your state's consumer protection office or the Consumer Protection Bureau, are the best places to contact if you suspect you've been the victim of a scam.

Is crypto mining real or fake? ›

Providing cloud mining services—otherwise known as mining-as-a-service—is a legitimate business, but some cloud mining companies are fraudulent.

How to get rid of crypto mining malware? ›

How to remove crypto mining malware
  1. Step 1: Identify the Malicious Process. ...
  2. Step 2: Disconnect from the Internet. ...
  3. Step 3: Use Antivirus or Anti-Malware Software. ...
  4. Step 4: Remove Malicious Files and Registry Entries. ...
  5. Step 5: Update Security Measures and Restore System.
Mar 8, 2024

What is cryptojacking in simple words? ›

Cryptojacking is a type of cybercrime that involves the unauthorized use of people's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency.

How do I know if my computer is being used to mine Bitcoin? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

What actually happens when you mine crypto? ›

Bitcoin mining is a network-wide competition to generate a cryptographic solution that matches specific criteria. When a correct solution is reached, a reward in the form of bitcoin and fees for the work done is given to the miner(s) who reached the solution first.

What is an example of crypto malware? ›

CryptoLocker is one of the most dangerous examples of crypto ransomware, a malicious program that encrypts everything on your device and demands you pay a ransom to have your data back. Coinhive. Coinhive was one of the best-known cryptojackers using JavaScript.

Which of the following is an example of cryptocurrency? ›

Examples of payment cryptocurrencies include Bitcoin, Litecoin, Monero, Dogecoin, and Bitcoin Cash.

What is the difference between ransomware and cryptojacking? ›

Even though cryptojacking is modest, it can build up over time and cause hardware damage, lower system performance, and higher operating costs because of energy usage. On the other hand, ransomware's immediate and severe effects include data loss, downtime, monetary losses, and reputational harm.

Top Articles
Mastercard Send™ - Platform for You to Transfer Money Online
Whats the Difference Between Banks and Credit Unions
Hotels Near 6491 Peachtree Industrial Blvd
Guardians Of The Galaxy Showtimes Near Athol Cinemas 8
Black Gelato Strain Allbud
877-668-5260 | 18776685260 - Robocaller Warning!
Songkick Detroit
Stolen Touches Neva Altaj Read Online Free
Slay The Spire Red Mask
U.S. Nuclear Weapons Complex: Y-12 and Oak Ridge National Laboratory…
Tripadvisor Near Me
Shariraye Update
No Strings Attached 123Movies
The most iconic acting lineages in cinema history
SXSW Film & TV Alumni Releases – July & August 2024
Ups Access Point Lockers
Illinois VIN Check and Lookup
Sadie Proposal Ideas
Accident On May River Road Today
Officialmilarosee
Apply for a credit card
Craigslist Appomattox Va
Jail View Sumter
Xfinity Outage Map Fredericksburg Va
Rs3 Ushabti
Sherburne Refuge Bulldogs
Hctc Speed Test
Kirsten Hatfield Crime Junkie
Chicago Based Pizza Chain Familiarly
Sound Of Freedom Showtimes Near Movie Tavern Brookfield Square
Cognitive Science Cornell
Accuradio Unblocked
Nearest Ups Ground Drop Off
Kaliii - Area Codes Lyrics
Warren County Skyward
Fbsm Greenville Sc
Quality Tire Denver City Texas
Moses Lake Rv Show
T&J Agnes Theaters
Tmka-19829
Planet Fitness Lebanon Nh
Ludvigsen Mortuary Fremont Nebraska
The best bagels in NYC, according to a New Yorker
Umd Men's Basketball Duluth
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
Spurs Basketball Reference
Egg Inc Wiki
Hampton Inn Corbin Ky Bed Bugs
Mike De Beer Twitter
BYU Football: Instant Observations From Blowout Win At Wyoming
What Are Routing Numbers And How Do You Find Them? | MoneyTransfers.com
Pauline Frommer's Paris 2007 (Pauline Frommer Guides) - SILO.PUB
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6170

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.