What is Cryptojacking?
Cryptojacking, also referred to as malicious crypto mining, is a threat that embeds itself within a computer or mobile device, then uses the device’s resources to “mine” cryptocurrency. When a hacker cryptojacks a device, they are capitalizing on the device’s computing ability to solve complicated math problems. The reward from solving these math problems is cryptocurrency, which then can be traded for other cryptocurrency or money. Cryptojacking steals resources which limits the capacity of the network and runs up extra electricity costs.
How Cryptojacking Works:
- You click on a malicious link in an email.
- The script captures your device's computing power and uses it to mine cryptocurrency.
- The cryptojacker monitors the crypto being mined and collects it in their digital wallet.
How to detect cryptojacking:
It can be difficult to detect cryptojacking after it has happened because the process is often hidden or made to look like a benevolent activity on your device. However, there are some telltale signs to watch out for:
- Your laptop or computer fan is running more that usual. This is because the cryptojacking script or website is causing it to heat up, and your fan is running to prevent overheating.
- Your device feels much hotter than usual.
- Your battery is draining more quickly than normal.
- Your device is running slowly, crashing, or exhibiting unusually poor performance.
- If you feel these issues exist you should contact your IT professional to evaluate your devices.
- Every business owner should consider purchasing Cyber Liability coverage to address issues like this including ransomware attacks, extortion, damage to equipment, files, software, release of sensitive informatoin, and loss income. Contact us for more information or to receive a quote.
