top of page

CRYPTOJACKING-The Unwanted guest in your system.

When it comes to investing in digital currency people have many questions about investing in digital currency. Many peoples use miners there's a time I also used to mine crypto. But before mining are you aware of cryptojacking? This is a cybercrime in which criminals use your ( victim's) computing power to generate cryptocurrency without the victim's knowledge. This usually occurs when the victim unwittingly installs a program with malicious scripts which allow the cybercriminal to access their computer or any other Internet-connected device, for example by clicking on an unknown link in an e-mail or visiting an infected website. Programs called ‘coin miners’ are then used by the criminal to create, or ‘mine’, cryptocurrencies. Many few know that digital currencies only needed and computing programs and computing power to create one. The type of cryptocurrency we see primarily mined on personal computers is called Monero. Most peoples say cryptojacking seems to be a harmless crime since the only thing ‘stolen’ is the power of the victim’s computer but these things are beneficial for the criminals who is illicitly creating currency. as much as the number of the infected device going increasing the amount of generating cryptocurrency going increasing.




Cryptojacking targets both endpoints and servers – both on-premises and in the cloud. The goal is the same: enslave a massive botnet of devices and harness CPU cycles to mine cryptocurrency with minimal cost or investment. These endpoints are targeted through the web browsers the common symptoms of getting victimized are sluggishness, high CPU usage, and the whine of maxed-out RPM on the cooling fans mobile devices and gadgets are also susceptible, even more so since the mining scripts can run in the background or are more difficult to identify. One example is the Android variant named ADB Miner. It typically runs on rooted devices using the same scanning code as the Mirai botnet -using the same techniques to search for open and accessible devices. If successful, the malware proceeds to infect them and mine Monero while spreading to more devices. Wannamine is one of the most recent types of cryptojacking attacks. Its file-less nature and use of legitimate system software such as WMI and PowerShell make it difficult, if not impossible, for organizations to block it without some form of next-generation antivirus. Defending against cryptojacking requires a holistic approach and building a security architecture with a secure digital perimeter. Some of the following common types to prevent cryptojacking are as follows.

1)Monitoring of resources on your computer.

2)Using extensions on the browsers which are designed for blocking crypto mining.

3)Blocking sites that are known to deliver cryptojacking scripts.

4) Keeping the system and software up to date.







34 views0 comments

Recent Posts

See All
bottom of page