CRYPTOJACKINGCryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine's resources to "generate" types of virtual money known as cryptocurrencies. It is an expanding threat, capable of infiltrating web browsers and compromising all types of devices, from desktop PCs to laptops to smartphones and even network servers. |
---|
CryptocurrenciesCryptocurrencies are a kind of digital money that exist only online and do not have a physical form. They were created as an alternative to traditional money and have gained popularity for their avant-garde, growth potential and anonymity. One of the earliest and most popular cryptocurrencies is Bitcoin, born in 2009. By December 2017, the value of a single Bitcoin reached an all-time high of nearly $ 20,000 USD, and then dropped below $ 10,000. The success of Bitcoin has inspired dozens of other cryptocurrencies, which work in much the same way. Less than ten years after their invention, people all over the world are using cryptocurrencies to buy, sell and invest. Two words - "cryptography" and "currency" - come together to form the term "cryptocurrency", which is electronic money based on the principles of complex mathematical cryptography. All cryptocurrencies exist in the form of decentralized crypto currency units, freely transferable between participants in a network. In simple terms, cryptocurrencies are electricity converted into lines of code with real monetary value. As with most cyber attacks, the motive is profit, but unlike other threats, this system is designed to remain completely hidden. |
---|
What is CryptojackingCryptojacking is a technique that exploits foreign devices (like computers, smartphones, tablets or even servers)
without the user being aware of it or giving their consent, to generate cryptocurrencies at the expense of the victim. Instead of
building a computer for cryptomining, hackers use cryptojacking to steal computing resources from their victims' devices.
Hackers can compete with sophisticated cryptomining operations without the exorbitant costs associated with them by combining all of these resources.
You may not be aware that you have been a victim of cryptojacking.
|
---|
How does it work?Cryptojackers can exploit a computer in various ways. One of the methods is similar to that used by classic malware. By clicking on a malicious link in an email, the cryptomining code is uploaded directly to your computer. Once the computer gets infected, the cryptojacker starts working to generate cryptocurrencies, remaining hidden in the background. Since it has settled on the PC, the problem is local - a persistent threat that has infected the computer itself. An alternative approach to cryptojacking is what is sometimes referred to as "drive-by cryptomining". As with malicious ad exploits, this method involves embedding a JavaScript code into a web page. After that, it starts generating cryptocurrencies on the machines that visit the page. |
---|
Cryptojacking |
Leonardo Guanci |
---|