Date First Published: 17th June 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 7/10
Learn about what cryptojacking is in this article.
Cryptojacking is the unauthorised use of someone else's computing resources to mine cryptocurrency. Cryptojacking malware often installs itself on computers using deception tactics, or sometimes by a drive-by download, and is designed to silently run in the background without the user being aware, so it does not usually harm any files or data. This means that cryptojacking can go unnoticed by the user for several days, weeks or even months. The goal of cryptojacking is obvious - to make money by mining valuable coins. Cryptojacking can target individuals, massive institutions, and even industrial control systems.
The only thing that is usually stolen is the user's computing resources, which is done without the user's permission or knowledge in order for cybercriminals to maliciously generate new cryptocurrency and perform the complex mathematical operations required to mine cryptocurrency and send the results to the cryptojacker's server. Cryptocurrencies rely on individuals to produce the power in order to produce new blocks and reward people who supply the computing power with cryptocurrency, which would be the cryptojacker, not the targets. People who exchange computing resources for currency are called miners.
Some cryptojacking malware can be a form of a worm which automatically infects other devices over a network to make as many copies as possible. The worm may also be able to detect if any other cryptojacking malware is already installed. If it is detected, the worm disables it.
Below are 6 signs that a computer is infected with cryptojacking malware:
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection