Articles > Cybersecurity >听What is cryptojacking and how can you avoid it?
Written by Michael Feder
From identity theft to stolen credit card numbers,听the estimated听 is projected to reach $15.63 trillion by 2029.听 More than of these crimes is attributed to cryptojacking. This portion of the cybercrime world includes breaches like terrorist financing, stolen funds, scams, ransomware, online pharmacy, malware, and the darknet market.
Cryptojacking is when a hacker secretly hijacks computers, smartphones, tablets or servers and turns them into听cryptocurrency miners. The unpermitted use exploits听blockchain networks听or applications, which otherwise securely record and maintain cryptocurrency transactions. More than in just the U.S.听Here鈥檚 what you need to know to prevent this type of crime.
Anyone who has a device connected to the internet and who browses webpages, checks email or downloads apps is at risk for cryptojacking.
While that sounds alarming, there are two common ways people usually fall victim. One occurs by听clicking on a malicious email link, which immediately loads crypto-mining software onto your device and, unbeknownst to you, turns it into a crypto-mining machine.
The other method, called听drive-by crypto-mining, happens when a piece of JavaScript code is embedded into a webpage so that any time a device is used to visit that page, the device gets used for cryptocurrency mining.
These schemes happen frequently on pages or apps that draw a lot of traffic. For example,听in 2018 a cryptojacking code was found hidden on the听.
A year later,听 were found in the Microsoft Store听and even promoted on lists of the top free apps. When users downloaded and launched one of the apps, they would unknowingly download cryptojacking software onto their device.听听In 2022, nearly were reported.
听
Since cryptojacking occurs in the background of an operating system, it can be difficult to detect. What鈥檚 more, because the code can be disguised to look like regular processes, even听antivirus and antimalware software听may miss it.
One problem this cyberthreat causes also happens to be one way to detect when cryptojacking is happening: It causes your device to not function properly. A听computer that鈥檚 being used to mine cryptocurrency :
Recognizing the signs of cryptoattacks is only one way to protect yourself from cybercrimes. Preventing them before they happen is another.
Taking steps to reduce the risk of crypto-malware is also helpful for听preventing other cyber threats. 听If there are concerns about a computer or IT system being under threat of cyberattack, consider connecting with an expert who has a听background in cybersecurity听and can identify the issue. IT professionals experienced in听digital forensics听can identify this type of malware, recover from it and prevent it and other cybercrime down the line. It鈥檚 worth the time 鈥� and a company鈥檚 security 鈥� to be proactive about understanding the impact of today鈥檚 most prominent cyberthreats.
Some helpful ways to听reduce the risk听of this type of malware are:
Keep in mind that when a computer is being victimized by this type of malware, it could also be troubled by other kinds of cyberattacks. One of the best methods of prevention is understanding other kinds of cybercrimes.
听
Initially,听crypto-malware may seem relatively harmless, but using devices for this cybercrime is more than a breach of security 鈥� it鈥檚 also a breach of privacy and the right to sole ownership of a device. Other cybersecurity threats include:
While this type of malware can burden a computer鈥檚 functionality, it鈥檚 not as immediately devastating as other cyberattacks, which often target financial and private information. That鈥檚 why it鈥檚 important to learn how to detect as many kinds of cyber threats as possible, including malicious cryptomining.
听
Whether you鈥檙e seeking to gain a basic understanding of cybersecurity and other IT skills so you know more how to prevent cryptojacking, or you鈥檙e a working professional looking to expand your knowledge, 乐鱼体育 offers听online course collections and degree programs.
Contact 乐鱼体育 for more information.
A graduate of Johns Hopkins University and its Writing Seminars program and winner of the Stephen A. Dixon Literary Prize, Michael Feder brings an eye for detail and a passion for research to every article he writes. His academic and professional background includes experience in marketing, content development, script writing and SEO. Today, he works as a multimedia specialist at 乐鱼体育 where he covers a variety of topics ranging from healthcare to IT.
This article has been vetted by 乐鱼体育's editorial advisory committee.听
Read more about our editorial process.