CRYPTOJACKING

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine's resources to "generate" types of virtual money known as cryptocurrencies. It is an expanding threat, capable of infiltrating web browsers and compromising all types of devices, from desktop PCs to laptops to smartphones and even network servers.

security



Cryptocurrencies

Cryptocurrencies are a kind of digital money that exist only online and do not have a physical form. They were created as an alternative to traditional money and have gained popularity for their avant-garde, growth potential and anonymity. One of the earliest and most popular cryptocurrencies is Bitcoin, born in 2009. By December 2017, the value of a single Bitcoin reached an all-time high of nearly $ 20,000 USD, and then dropped below $ 10,000. The success of Bitcoin has inspired dozens of other cryptocurrencies, which work in much the same way. Less than ten years after their invention, people all over the world are using cryptocurrencies to buy, sell and invest. Two words - "cryptography" and "currency" - come together to form the term "cryptocurrency", which is electronic money based on the principles of complex mathematical cryptography. All cryptocurrencies exist in the form of decentralized crypto currency units, freely transferable between participants in a network. In simple terms, cryptocurrencies are electricity converted into lines of code with real monetary value. As with most cyber attacks, the motive is profit, but unlike other threats, this system is designed to remain completely hidden.



What is Cryptojacking

Cryptojacking is a technique that exploits foreign devices (like computers, smartphones, tablets or even servers) without the user being aware of it or giving their consent, to generate cryptocurrencies at the expense of the victim. Instead of building a computer for cryptomining, hackers use cryptojacking to steal computing resources from their victims' devices. Hackers can compete with sophisticated cryptomining operations without the exorbitant costs associated with them by combining all of these resources. You may not be aware that you have been a victim of cryptojacking.

Most cryptojacking software is designed to stay hidden, but that doesn't mean there aren't any consequences. Theft of computing resources causes other processes to slow down, raises electricity expenses, and reduces the device's useful life. Depending on how subtle the attack is, you may notice some warning signs. If your PC or Mac slows down or uses its cooling fan more than normal, you may have reason to suspect cryptojacking activity.




How does it work?

Cryptojackers can exploit a computer in various ways. One of the methods is similar to that used by classic malware. By clicking on a malicious link in an email, the cryptomining code is uploaded directly to your computer. Once the computer gets infected, the cryptojacker starts working to generate cryptocurrencies, remaining hidden in the background. Since it has settled on the PC, the problem is local - a persistent threat that has infected the computer itself. An alternative approach to cryptojacking is what is sometimes referred to as "drive-by cryptomining". As with malicious ad exploits, this method involves embedding a JavaScript code into a web page. After that, it starts generating cryptocurrencies on the machines that visit the page.


Cryptojacking

Leonardo Guanci

next article