DEFINITION of 'Cryptojacking'

Cryptojacking is a form of cyber attack in which a hacker hijacks a target's processing power in order to mine cryptocurrency on the hacker's behalf.

BREAKING DOWN 'Cryptojacking'

Cryptojacking has become an increasingly popular way for bad actors to extract money from targets in the form of cryptocurrency. Widely publicized hacks such as the WannaCry worm, which affected systems on several continents in May 2017, encrypted victims' files and demanded cryptocurrency ransoms – bitcoin, in the case of WannaCry – in order to decrypt them.

Cryptojacking takes a different approach, harnessing victims' machines to "mine": perform the computations necessary to update cryptocurrencies' blockchains, creating new tokens and generating fees in the process. These new tokens and fees are deposited to wallets owned by the attacker, while the costs of mining – electricity and wear and tear to computers – are borne by the victim.

Examples of Cryptojacking Attacks

In February 2018, a Spanish cybersecurity firm, Panda, wrote that a cyrptojacking scrypt known as WannaMine had spread to "computers around the world." The malware was being used to mine monero, a cryptocurrency that is notable for its ability to mine using CPUs (as opposed to GPUs or ASICs) while actually having some value in fiat terms. 

Later the same month, governments in Britain, the U.S. and Canada were affected by a cryptojacking attack that took advantage of a vulnerability in a text-to-speech software embedded in many of these governments' sites. Attackers inserted Coinhive script into the software, allowing them to mine monero using visitors' browsers. 

Browser mining is becoming an increasingly common practice. The lines between cryptojacking and legitimate practice are not always clear. Coinhive is often described as malware, but Salon recently partnered with its developers to mine monero using visitors' browsers – with their permission – as a way of monetizing the outlet's content when faced with adblockers.

Some experts have cited the potential of browser mining as an alternative to ad-based monetization: in essence, legitimized cryptojacking. Such proposals are extremely controversial, given the potential costs to users in terms of power consumption and damage to hardware.

Later in February, it was revealed that Tesla Inc. had been the victim of cryptojacking when its Amazon Web Services software container was compromised. Similar attacks on companies have been reported going back to October 2017.

  1. Mining

    Mining validates transactions on the cryptocurrency network and ...
  2. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
  3. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  4. Application-Specific Integrated ...

    An application-specific integrated circuit (ASIC) is a piece ...
  5. Litecoin Mining

    Litecoin mining is the processing of a block of transactions ...
  6. Cryptocurrency

    A digital or virtual currency that uses cryptography for security. ...
Related Articles
  1. Tech

    Salon Wants to Use Your Computer for Cryptocurrency Mining wants to borrow readers' computers to mine the cryptocurrency Monero to make up for lost ad revenue.
  2. Tech

    Cryptocurrency Mining Malware Attacks Are a Threat

    More than 1.65 million computers have been targeted in malware attacks related to cryptocurrency mining.
  3. Tech

    Tesla’s Cloud Was Hacked for Mining Cryptocurrency

    Tesla claims that customer privacy and vehicle safety weren't compromised during the attack.
  4. Tech

    Showtime Websites Used Visitors' Computer Power for Crypto Mining

    Sites linked to Showtime were caught running a script app called Coinhive, which harnessed visitors’ CPU power to mine cryptocurrencies.
  5. Tech

    Bitcoin Gold Hack Shows 51% Attack Is Real

    Bitcoin Gold might be at the receiving end of a 51% attack. If true, this theoretically means a hacker can take control of the cryptocurrency.
  6. Investing

    WannaCry Hackers Threaten Another Microsoft Data Dump

    The hacking group behind the WannaCry attack are threatening another data dump.
  7. Personal Finance

    How Cyber Security Risks Impact Your Bank

    Cyber security has become a paramount concern for the banking sector, but some banks have been hesitant to implement much-needed security measures.
  8. Tech

    Are Large Mining Pools Bad For Cryptocurrencies?

    Cryptocurrency mining are being done on expensive mining pools run by large firms. Is this bad for cryptocurrencies?
  9. Tech

    How Much Does It Cost to Mine Bitcoin Around the World?

    Bitcoin mining costs vary widely in 115 countries, according to a new study.
  10. Tech

    Why Cryptocurrency Mining is the New Ransomware

    Combatting unsolicited mining should be a priority for decentralized developers, even above functionality like interoperability and scaling.
  1. What main factors affect share prices in the metals and mining sector?

    Discover the primary factors that influence share prices of companies in the metals and mining sector and how companies can ... Read Answer >>
  2. What value metrics are best for analyzing companies in the metals and mining sector?

    Learn what some of the best valuation measures are that analysts commonly use to evaluate companies in the metals and mining ... Read Answer >>
  3. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  4. What are the top Social Security scams targeted at the elderly?

    Prevent Social Security scams by learning to recognize the most common types of scams that target senior citizens receiving ... Read Answer >>
Trading Center