Coconote
AI notes
AI voice & video notes
Try for free
đź’»
Understanding Cryptojacking and Its Impacts
May 22, 2025
Cryptojacking: An Overview
Definition
Cryptojacking
is the unauthorized use of someone else's computer to mine cryptocurrency.
How It Works
Hackers utilize two main methods to execute cryptojacking:
Victims click on a malicious link in an email, loading cryptomining code onto the computer.
Websites or online ads are infected with JavaScript code that auto-executes when loaded in the victim’s browser.
Hackers often use both methods to increase their return.
Effects on Victims
Cryptojacking scripts do not damage computers or data.
They steal CPU processing resources, often resulting in:
Slower computer performance.
For organizations, increased IT costs and effort to resolve performance issues.
Case Study
At the 2018 EmTech Digital conference, Darktrace shared a case of a European bank experiencing unusual server traffic.
Discovery of unauthorized servers set up by a rogue staffer for cryptomining.
Prevalence and Appeal
Exact amount of cryptocurrency mined through cryptojacking is unknown, but it's widespread due to economic incentives:
More money with less risk.
Availability of inexpensive kits on the dark web.
Low technical skill requirement.
Cryptomining delivery methods derive from malware delivery techniques (e.g., ransomware, adware).
Notable Incidents
2017 Kaspersky Labs Discovery:
Google Chrome extension 'Facexworm' used Facebook Messenger to infect computers.
Originally delivered adware.
2018 Trend Micro Discovery:
'Facexworm' targeted cryptocurrency exchanges, capable of delivering cryptomining code.
Stole web accounts and credentials for cryptojacking code injection.
Prevention Strategies
Awareness and Education
Learn to identify phishing emails to avoid clicking on malicious links.
Adblocker Installation
Blocks cryptojacking scripts delivered through web ads.
Some blockers detect cryptomining scripts specifically.
Antivirus Software
Use updated antivirus programs with crypto miner detection features.
Provides a layer of protection against cryptojacking.
đź“„
Full transcript