DEFINITION of 'Cryptojacking'

Cryptojacking is a form of cyber attack in which a hacker hijacks a target's processing power in order to mine cryptocurrency on the hacker's behalf.

BREAKING DOWN 'Cryptojacking'

Cryptojacking has become an increasingly popular way for bad actors to extract money from targets in the form of cryptocurrency. Widely publicized hacks such as the WannaCry worm, which affected systems on several continents in May 2017, encrypted victims' files and demanded cryptocurrency ransoms – bitcoin, in the case of WannaCry – in order to decrypt them.

Cryptojacking takes a different approach, harnessing victims' machines to "mine": perform the computations necessary to update cryptocurrencies' blockchains, creating new tokens and generating fees in the process. These new tokens and fees are deposited to wallets owned by the attacker, while the costs of mining – electricity and wear and tear to computers – are borne by the victim.

Examples of Cryptojacking Attacks

In February 2018, a Spanish cybersecurity firm, Panda, wrote that a cyrptojacking scrypt known as WannaMine had spread to "computers around the world." The malware was being used to mine monero, a cryptocurrency that is notable for its ability to mine using CPUs (as opposed to GPUs or ASICs) while actually having some value in fiat terms. 

Later the same month, governments in Britain, the U.S. and Canada were affected by a cryptojacking attack that took advantage of a vulnerability in a text-to-speech software embedded in many of these governments' sites. Attackers inserted Coinhive script into the software, allowing them to mine monero using visitors' browsers. 

Browser mining is becoming an increasingly common practice. The lines between cryptojacking and legitimate practice are not always clear. Coinhive is often described as malware, but Salon recently partnered with its developers to mine monero using visitors' browsers – with their permission – as a way of monetizing the outlet's content when faced with adblockers.

Some experts have cited the potential of browser mining as an alternative to ad-based monetization: in essence, legitimized cryptojacking. Such proposals are extremely controversial, given the potential costs to users in terms of power consumption and damage to hardware.

Later in February, it was revealed that Tesla Inc. had been the victim of cryptojacking when its Amazon Web Services software container was compromised. Similar attacks on companies have been reported going back to October 2017.

  1. Mining

    Mining validates transactions on the cryptocurrency network and ...
  2. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  3. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  4. Application-Specific Integrated ...

    An application-specific integrated circuit (ASIC) is a piece ...
  5. ASIC

    ASICs are new-age integrated electronic circuits used in cryptocurrency ...
  6. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack ...
Related Articles
  1. Tech

    Cryptojacking Rose by 8,500% Last Year

    Illicit cryptocurrency mining has become a major problem.
  2. Tech

    Sites Are Using Your Browser to Mine Crypto. It Could Be a Good Thing

    Early on, bitcoin and other cryptocurrencies promised to disrupt the web's ad-based monetization model. They failed. Is browser mining a second chance?
  3. Tech

    What is Illicit Cryptomining?

    Illicit cryptomining is when malicious parties try to surreptitiously mine for cryptocurrency using others' computing power.
  4. Tech

    Cryptocurrency Mining Malware Attacks Are a Threat

    More than 1.65 million computers have been targeted in malware attacks related to cryptocurrency mining.
  5. Tech

    Tesla’s Cloud Was Hacked for Mining Cryptocurrency

    Tesla claims that customer privacy and vehicle safety weren't compromised during the attack.
  6. Tech

    More Websites Turn to Cryptocurrency Mining for Revenue

    As bitcoin's price soars higher and higher, websites look to cash in on a new source of revenue.
  7. Tech

    Showtime Websites Used Visitors' Computer Power for Crypto Mining

    Sites linked to Showtime were caught running a script app called Coinhive, which harnessed visitors’ CPU power to mine cryptocurrencies.
  8. Tech

    Apple: Don't Mine Cryptocurrencies on an iPhone

    An updated set of developer guidelines has outlawed cryptocurrency mining on iOS devices.
  9. Investing

    WannaCry Hackers Threaten Another Microsoft Data Dump

    The hacking group behind the WannaCry attack are threatening another data dump.
  10. Personal Finance

    How Cyber Security Risks Impact Your Bank

    Here's how cyber security risks mean for the financial industry and consumers.
  1. How does government regulation impact the metals and mining sector?

    Learn how permit processes and regulations impact new mining projects. Discover how government bureaucracy and litigation ... Read Answer >>
  2. What is the metals and mining sector?

    Learn about the mining sector and the many ways that mining companies profit from the location and extraction of minerals ... Read Answer >>
  3. What does the grade of a gold mine refer to?

    Discover how gold mines are graded, how the World Gold Council defines a high-grade gold mine, and where the highest graded ... Read Answer >>
Trading Center