Cryptojacking
Cryptojacking is a cybercrime where an attacker uses malware to abuse someone else's computing technology (computer, mobile, tablet or even an entire server) to illegally mine cryptocurrencies. Victims of the attack thus unkowingly mine cryptocurrency.
How does cryptojacking work?
Cybercriminals mine cryptocurrencies using malware that enters a victim's device in two ways:
•The victim downloads and installs the malicious app by clicking on a "suppressed link," for example, in an email.
•By infecting a website or online ad with JavaScript code that automatically executes when loaded into the victim's browser.
Bitcoin, Ethereum nebo Monero?
Most malicious scripts and executables for cryptocurrency mining today mine the cryptocurrency Monero or Ethereum. These cryptocurrencies offer cybercriminals several advantages over the better-known Bitcoin: they have higher transaction anonymity. They can be mined using common processors and graphics cards without purchasing expensive, specialized hardware.
How do I know my computer is mining cryptocurrency?
Cryptocurrency mining using malware is associated with extremely high CPU activity, which has noticeable side effects. Victims often report a visible decrease in the performance of the device, its overheating, and increased fan activity (and noticeable noise). Sometimes, the battery may even "bloat" and thus physically damage or destroy the device.
How to protect yourself from cryptojacking?
Use a reliable and multilayered security solution or antivirus protection that blocks unwanted activities related to cryptomining malware and computer viruses. If you notice significantly higher CPU usage when visiting a certain website, close your web browser.
Sometimes, restarting the computer to close even hidden browser windows that continue mining in the background is advisable. After restarting, do not allow the web browser automatically restore the previous session, as this could reopen the tab with the illegal cryptocurrency mining page.