Jump to content

Cryptojacking: Difference between revisions

From ICANNWiki
Added background information, motive, symptoms, and preventative strategies
 
Added links to cryptocurrency
 
Line 1: Line 1:
Cryptojacking refers to the unauthorized usage of another person's computer to mine cryptocurrency. This process is usually done without the knowledge of the victim.<ref>https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html</ref>
Cryptojacking refers to the unauthorized usage of another person's computer to mine [[cryptocurrency]]. This process is usually done without the knowledge of the victim.<ref>https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html</ref>


This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref>
This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref>
Line 7: Line 7:


== Symptoms ==
== Symptoms ==
There are several ways to tell if a computer has been hacked in order to mine cryptocurrency without the consent of the owner.
There are several ways to tell if a computer has been hacked in order to mine [[cryptocurrency]] without the consent of the owner.


* Performance of devices greatly decreasing or noticeable increase of processing usage
* Performance of devices greatly decreasing or noticeable increase of processing usage

Latest revision as of 18:56, 13 June 2023

Cryptojacking refers to the unauthorized usage of another person's computer to mine cryptocurrency. This process is usually done without the knowledge of the victim.[1]

This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.[2]

Motive

Cryptocurrency mining requires a powerful processor running constantly. Rather than paying for an expensive computer, hackers use the processing power of others in order to mine cryptocurrency and make money.

Symptoms

There are several ways to tell if a computer has been hacked in order to mine cryptocurrency without the consent of the owner.

  • Performance of devices greatly decreasing or noticeable increase of processing usage
  • Rapidly decreasing battery life or consistent overheat of batteries
  • Device fans frequently turning on despite minimal usage

How to Prevent Cryptojacking

In order to decrease vulnerability to cryptojacking, Internet users should take the following actions into consideration:

  • Monitor device performance, especially processing speed and power usage.[3]
  • Install anti-malware software and ad blockers
  • Continuously update browsers, applications, and computer

References