Everything You Need To Know About Cryptojacking

Jump to page contents

Everything You Need To Know About Cryptojacking

Cryptojacking is one of the darker aspects of the cryptocurrency industry. Involving crypto mining, this process sees cybercriminals assuming control of a mining rig‘s processing power and deflect its operations for their own benefit.

What is Cryptojacking and How does it Work?

what is cryptojacking?
Image Source

The broad definition of Cryptojacking is when an individual or group use the victim’s computing power to mine cryptocurrencies without their consent. The more sophisticated this attack is, the harder it is for a victim to even realise that the attack is taking place.

Unfortunately, Cryptojacking has quickly grown to become one of the most common and successful forms of malware. Unlike most attacks which target user data or access, this type focuses solely on processing power. Just like normal crypto mining, the purpose of the attack remains to mine Bitcoin or Ethereum. The only difference is that the newly mined coins are settled in the hacker’s wallet, not the one which belongs to the owner of the rig.

While fiat currency cannot be recreated genuinely, cryptocurrencies are different. Their democratic structure allows anyone with sufficient computing power to mint new coins. With the rise in popularity of cryptocurrencies, it was inevitable that cybercriminals would seek ways to benefit from mining.

In order to Cryptojack a device, these hackers utilise several techniques. The most popular method involves making use of proven traditional tricks, such as sending malware via an email link or attachment. Clicking or opening this malware automatically installs the mining code into the rig. If the installation is successful, the rig is automatically set to deposit new crypto to the attacker’s wallet.

A less popular method is called “drive-by crypto mining”. A JavaScript code is embedded in a seemingly innocent website, but every time a machine visits this page, a mining process activates.

Tests and research carried out by several cryptocurrency websites have shown that Cryptojacking is on the rise. It is estimated that over 33,000 websites are a victim of the “drive-by crypto mining” attack, counting around a billion monthly users. Coinhive and Cryptoloot seem to be the most popular JavaScript miners in these attacks, although, it should be noted, that these programs are popular also amongst genuine crypto miners.

The two main reasons behind the popularity of Cryptojacking are profits and ease of entry. With limited technical abilities, hackers can start a very enterprising attack with huge rewards. There are even kits available on the dark web for those who wish to get involved. At the same time, awareness about Cryptojacking is limited, especially amongst potential victims, increasing the chances that an attack remains unnoticed for extended periods of time.

At the moment, Cryptojacking is seen as low-risk for high rewards. Ransomware, for example, might result in a 5% success rate, but Cryptojacking can result in up to 100% success rates. Moreover, while Ransomware attacks are paid out once, Cryptojacking’s rewards are continuous.

To make matters worse, even when an attack is identified, the probability of identifying the ultimate beneficiary of the attack is close to impossible. These attacks normally involve more anonymous cryptocurrencies, such as Monero or Zcash, over the more popular, yet less anonymous Bitcoin or Ethereum. Victims, too, are reluctant to press on investigations, since technically the attack did not result in any asset being stolen.

How do People Use Cryptocurrencies?

For the past five years, the use of cryptocurrencies has increased dramatically across the globe. No longer seen as just a novelty, digital currencies are set to revolutionise the payments and banking industry. Numerous major brands are involving this technology in their processes, and the number of new cryptocurrency projects, such as Project Libra, are on the rise.

There are over 1,000 different cryptocurrencies today, although the top 20 account for the majority of trading and interest. Bitcoin, Ethereum, Litecoin, and Bitcoin Cash are amongst the most popular cryptocurrencies and are available in many exchanges. Moreover, due to the high volatility of cryptocurrencies, they are also a popular trading market.

Screenshots are shown for illustration purposes only. Actual product may vary.

Apart from trading cryptocurrencies, traders trade Contracts for Difference (CFDs), which allow them to profit from cryptocurrencies without actually owning them. eToro is a popular platform for crypto-enthusiasts since it offers both the option to invest in cryptocurrencies as well as to trade crypto CFDs. The platform supports a high number of digital and fiat currencies and accepts a comprehensive list of payment methods.

This ad promotes cryptocurrency within the EU (by eToro Europe Ltd. and eToro UK Ltd.) & USA (by eToro USA LLC); which is highly volatile, unregulated in some EU countries and the UK., no EU consumer protection. Investments are subject to market risk, including the loss of principal.

Apart from using it to trade or to HODL, an increasing number of people use cryptocurrencies to buy goods and services online, as well as gamble. 

Real-world Cryptojacking Examples

Unfortunately, there is no shortage of Cryptojacking case studies to study and learn from. The following are a few of the most successful.


A particular MinerGate malware attack features a creative alternation to the code family. This feature variant is capable of noticing when there is mouse movement and immediately suspending Cryptojacking activity. This not only makes it harder for the victim to notice anything unusual, such as a drop in performance but makes it virtually impossible to check for the possibility of a hack.

Bank’s Rogue Staffer

A European bank was experiencing unusual processing power consumption during the night. The bank’s diagnostic tools were not able to pick up any malware, yet there was evidence of slower performance. Eventually, outsourced professionals were able to uncover a subtle process which would engage at night. This process was enabled through a code installed by a rogue staffer.


The popular website, GitHub, became an unwilling host of a Cryptojacking attack. Hackers would identify legitimate projects and create forks, which hold the malware hidden in their directory structure. By using a phishing mechanism, these attackers were able to lure their victims to download the malware. These mechanisms took many forms, such as requiring a Flash player update or offering a special adult content game.

Protecting your Resources from Cryptojacking

Since Cryptojacking involves the installation of malware, it can be very difficult to detect once installed. In fact, the most probable way of uncovering an intrusion is by noticing a sudden slow down in processing power. In a larger organisation, the effects of a successful attack may not appear until a system administrator notices that particular network servers are operating at maximum capacity. Once it reaches this stage, it can be very difficult and slow to run troubleshooting tools.

Therefore, the best way for you to protect your hardware against Cryptojacking is preventing a successful attack. Standard firewalls may not be able to effectively protect your systems. Larger organisations should definitely invest in advanced intrusion prevention systems and next-generation firewalls. It may, however, not be feasible for smaller businesses or individuals to cover the costs for such systems, so increased vigilance and ensuring that the firewall is updated are a must.

Should you discover an attack or notice the symptoms of one, you need to take the necessary steps to conduct a root-cause analysis. This helps identify malware and helps prevent repeat attacks in the future.

Ready to join our tribe?

We respect your email privacy

Subscribe now to recieve exclusive updates and offers!

Recently Similar Guides

Latest Guides


Is Litecoin a good investment right now?

Litecoin is popularly known as the second cryptocurrency to be created, as it came to life in 2011 by a former Google employee, Charlie Lee. It is an open-source software that aids peer-to-peer cryptocurrency transactions. It is quite similar to Bitcoin and most times referred to as an altcoin or spinoff of Bitcoin. We cover […]

21 July, 2021

5 Top Altcoins That Will Explode in 2021

Cryptocurrency is a concept known to virtually every human on the face of the earth. From the launch of the first cryptocurrency, Bitcoin, it has gradually become an acceptable financial concept that has the potential to take over from the traditional fiat currency. Apart from Bitcoin, which is widely known as the most popular and […]

14 July, 2021

What is the Fear and Greed Index?

No crypto investor wants to buy an overvalued coin only to discover that their long position has been Swiss-cheesed even before the move was made. More often than not, the glittering of a ‘coin’ is a question of unstable human emotions instead of adequate research and tenable data. To properly evaluate the worth of a […]

5 July, 2021

What is a gold-backed cryptocurrency?

Gold-backed cryptocurrency can be defined as a stablecoin that backs each token with physical gold. Because of the volatility of the cryptocurrency market, many people are uncomfortable with the market and so prefer to invest their money in different stocks and indices. But with a gold-backed cryptocurrency, the token is pegged to a current gold […]

27 June, 2021
Bitcoin,Crypto Wallets

How long does Bitcoin take to send?

Bitcoin is king when it comes to cryptocurrencies. As the pioneer in the industry, it has maintained its position as number one in terms of market cap and daily traded volume. But have you ever wondered, how long does Bitcoin take to send? Or how long does a Bitcoin transaction take? Well, in this article […]

22 June, 2021
Crypto Mining,Mining

CPU vs GPU Mining at Home: Which is Better?

As cryptocurrency becomes mainstream, more and more people are getting involved in the crypto-world. This has also raised curiosity on how to mine cryptocurrencies and not just exchange and purchase them. As exciting as this sounds, crypto-mining is not easy to achieve, as it requires deep technical knowledge. If mining cryptos is something you are […]

15 June, 2021
Crypto Wallets,DogeCoin,Ethereum,Litecoin,Ripple

Best Ways for Coin Storage to Protect Your Cryptocurrency

As the price of Bitcoin and other cryptocurrencies continues to soar, news of people who have lost access to their crypto stash is always hitting the headlines. Recently, Stefan Thomas, a German-born crypto enthusiast, made news when he had only two attempts to his password for him to access his 7,002 Bitcoins worth millions of […]

9 June, 2021
Crypto Mining,Mining,Monero

How To Mine Monero (XMR) In 2021

In this how to mine Monero guide, we will provide you with the important information you need to know before you mine this cryptocurrency. We will also offer guidance on building your Monero mining rig and where you can sell your coins for a profit. What is Monero? Monero is an open-source digital currency that […]

6 June, 2021