What is "Cryptojacking" ?

What is “Cryptojacking” ?

Cryptojacking is a technique used by hackers to make unauthorized use of the user’s browser to mine cryptocurrency. Cryptojacking is usually implemented by hackers by either of two ways:

  1. Sending an email to the user that contains a malicious link. If the user clicks the link, the crypto mining code will be loaded on the user’s system.
  2. Infecting the website or online ad with JavaScript code. As it is loaded in the victim’s browser, the malicious JavaScript code will execute automatically.

How do Hackers Perform Cryptojacking?

  1. Firstly, the hacker successfully hacks the website.
  2. When the user connects with the hacked website, the crypto-mining script executes.
  3. Unaware of the hacking process, victims start the process of crypto mining on behalf of the hackers.
  4. Once a new block has been added to the blockchain by the user, the hackers get cryptocurrency coins, thus making them successful in performing the cryptojacking.

How to Prevent Cryptojacking?

In order to prevent cryptojacking, the following methods can be implemented:

  1. Using an ad-blocker: As mentioned previously, the hackers may infect online ads with embedded malicious JavaScript code. Therefore, you should use an ad-blocker in order to prevent infections from unwanted and malicious advertisements and scripts.
  2. Using a browser extension for blocking crypto-mining scripts: Sometimes cryptomining scripts can also be malicious. Thus, by using browser extensions that are available for blocking cryptomining scripts can prevent chances of cryptojacking.
  3. Antivirus/anti-malware software should be regularly updated: The antivirus/ anti-malware software is already capable of block cryptomining. Thus, it is advised to keep the antivirus/ anti-malware software updated.
  4. All the unnecessary browser extensions should be disabled: All the unnecessary browser extensions that are no longer in use should be disabled or removed as it is quite possible that a legitimate extension becomes malicious after an update.