DEFINITION of 'Cryptojacking'

Cryptojacking is a form of cyber attack in which a hacker hijacks a target's processing power in order to mine cryptocurrency on the hacker's behalf.

BREAKING DOWN 'Cryptojacking'

Cryptojacking has become an increasingly popular way for bad actors to extract money from targets in the form of cryptocurrency. Widely publicized hacks such as the WannaCry worm, which affected systems on several continents in May 2017, encrypted victims' files and demanded cryptocurrency ransoms – bitcoin, in the case of WannaCry – in order to decrypt them.

Cryptojacking takes a different approach, harnessing victims' machines to "mine": perform the computations necessary to update cryptocurrencies' blockchains, creating new tokens and generating fees in the process. These new tokens and fees are deposited to wallets owned by the attacker, while the costs of mining – electricity and wear and tear to computers – are borne by the victim.

Examples of Cryptojacking Attacks

In February 2018, a Spanish cybersecurity firm, Panda, wrote that a cyrptojacking scrypt known as WannaMine had spread to "computers around the world." The malware was being used to mine monero, a cryptocurrency that is notable for its ability to mine using CPUs (as opposed to GPUs or ASICs) while actually having some value in fiat terms. 

Later the same month, governments in Britain, the U.S. and Canada were affected by a cryptojacking attack that took advantage of a vulnerability in a text-to-speech software embedded in many of these governments' sites. Attackers inserted Coinhive script into the software, allowing them to mine monero using visitors' browsers. 

Browser mining is becoming an increasingly common practice. The lines between cryptojacking and legitimate practice are not always clear. Coinhive is often described as malware, but Salon recently partnered with its developers to mine monero using visitors' browsers – with their permission – as a way of monetizing the outlet's content when faced with adblockers.

Some experts have cited the potential of browser mining as an alternative to ad-based monetization: in essence, legitimized cryptojacking. Such proposals are extremely controversial, given the potential costs to users in terms of power consumption and damage to hardware.

Later in February, it was revealed that Tesla Inc. had been the victim of cryptojacking when its Amazon Web Services software container was compromised. Similar attacks on companies have been reported going back to October 2017.

  1. 51% Attack

    51% attack refers to an attack on a blockchain – usually bitcoin's, ...
  2. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
  3. Bitcoin Mining

    Bitcoin mining is the process by which transactions are verified ...
  4. Cloud Mining

    Cloud mining offers a mechanism to mine a cryptocurrency such ...
  5. Mining Pool

    A mining pool is a joint group of cryptocurrency miners who combine ...
  6. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
Related Articles
  1. Tech

    Cryptojacking Rose by 8,500% Last Year

    Illicit cryptocurrency mining has become a major problem.
  2. Tech

    Salon Wants to Use Your Computer for Cryptocurrency Mining wants to borrow readers' computers to mine the cryptocurrency Monero to make up for lost ad revenue.
  3. Tech

    What is Illicit Cryptomining?

    Illicit cryptomining is when malicious parties try to surreptitiously mine for cryptocurrency using others' computing power.
  4. Tech

    Hackers Target Computer Rigs to Illegally Mine Cryptocurrencies

    Hackers are now stealing random people's computer power to mine digital tokens in an alarming new trend.
  5. Tech

    Showtime Websites Used Visitors' Computer Power for Crypto Mining

    Sites linked to Showtime were caught running a script app called Coinhive, which harnessed visitors’ CPU power to mine cryptocurrencies.
  6. Tech

    What Is Monero (XMR) Cryptocurrency?

    The cryptocurrency Monero (XMR) has become increasingly popular due to its enhanced privacy features.
  7. Tech

    Crypto Mining Up 8,500% Last Year: Report

    Security firm Symantec calls cryptocurrency mining the biggest trend of 2017.
  8. Investing

    New Cyber Attack Exploits Microsoft Bug, Generates Digital Currency

    Another cyber attack relying on a Microsoft bug is spreading around the globe at the same time the hacking group Shadow Brokers is warning of more pain to come.
  9. Tech

    SWIFT Attacks: Hackers Strike Again

    The recent SWIFT cyberattack has revealed connections to the earlier Bangladesh and Sony attacks.
  10. Tech

    UNICEF Site Engages in Consensual Crypto Mining

    UNICEF Australia is using consent-based cryptocurrency mining to garner funds for noble causes.
  1. What value metrics are best for analyzing companies in the metals and mining sector?

    Learn what some of the best valuation measures are that analysts commonly use to evaluate companies in the metals and mining ... Read Answer >>
  2. How much of a diversified portfolio should be exposed to the metals and mining sector?

    Learn what criteria investors use to determine what percentage of their diversified portfolios should be exposed to the metals ... Read Answer >>
  3. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
Hot Definitions
  1. Financial Risk

    Financial risk is the possibility that shareholders will lose money when investing in a company if its cash flow fails to ...
  2. Enterprise Value (EV)

    Enterprise Value (EV) is a measure of a company's total value, often used as a more comprehensive alternative to equity market ...
  3. Relative Strength Index - RSI

    Relative Strength Indicator (RSI) is a technical momentum indicator that compares the magnitude of recent gains to recent ...
  4. Dividend

    A dividend is a distribution of a portion of a company's earnings, decided by the board of directors, to a class of its shareholders.
  5. Inventory Turnover

    Inventory turnover is a ratio showing how many times a company has sold and replaces inventory over a period.
  6. Watchlist

    A watchlist is list of securities being monitored for potential trading or investing opportunities.
Trading Center