The use of another party’s computer to mine cryptocurrency without their consent.
Cryptojacking can be performed in multiple different ways, but there are two most popular ones. The first way is via a trojan — a malicious program that gets installed onto a computer without the owner’s knowledge or consent by, for example, clicking on an email link or attachment. The program then keeps running on the host computer, consuming its resources, while the profits go to the hacker.
The other popular option is the so-called “drive-by” cryptojacking, which is performed online via malicious JavaScript code on web pages that are either owned by the hackers outright or have been compromised by them.
Cryptojacking leads to increased consumption of its victims’ electrical power, slows down their computers and shortens the life of their equipment. If a user suspects that their computer might have been the target of a cryptojacking attack, they should look out for red flags: decreased performance and the overheating of their computer, which is usually coupled with more intense use of the cooling fan. Most modern antivirus software providers are acutely aware of the threat of cryptojacking, so they offer protection from it.
In a browser-based cryptojacking attack, hackers typically embed malicious code in various websites. Once the victim accesses the infected websites, the crypto mining script immediately takes effect within that device.
Cryptojacking schemes can go unnoticed for a long time, allowing hackers to mine with total impunity from unsuspecting victims’ devices. Mining activities incur high electricity costs, which hackers pass on to their victims so they can earn token rewards without financial burden.
Cryptojacking scripts can cause devices to lag or even break down due to wear and tear.
Additionally, there is a class of cryptojacking scripts that has a worming ability that allows it to replicate fast, infecting multiple devices and servers within a network.
Some measures to avoid falling victim to cryptojacking schemes include the use of ad-blockers and anti-crypto mining extensions.
Join the thousands already learning crypto!