Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Cryptojacking

1 min read
Pronunciation
[krip-toh-jak-ing]
Analogy
Think of cryptojacking like someone secretly siphoning electricity from your house and using your appliances (your computer's processing power) to run their own power-hungry business (mining cryptocurrency) without your permission. You notice your electricity bill is higher (slower computer performance, increased fan noise), but you might not immediately know why.
Definition
Cryptojacking is the unauthorized use of someone else's computing resources (like CPU, GPU, or electricity) to mine cryptocurrency without their consent or knowledge. Attackers can achieve this by infecting a victim's computer with malware or by injecting malicious JavaScript into websites that executes in visitors' browsers.
Key Points Intro
Cryptojacking stealthily hijacks computing resources to mine cryptocurrencies for the attacker's benefit.
Key Points

Unauthorized Resource Use: Illegally uses victim's CPU/GPU power and electricity.

Stealthy Operation: Often designed to run hidden in the background.

Methods: Can occur via malware infection or malicious scripts on websites (drive-by mining).

Impacts Performance & Costs: Degrades device performance, increases energy consumption, and can reduce hardware lifespan.

Example
A user visits a compromised website that contains a hidden JavaScript miner. While the user browses the site, the script uses their computer's CPU power to mine a privacy-focused cryptocurrency like Monero for the attacker. The user might only notice their computer slowing down or their fan running louder than usual.
Technical Deep Dive
Cryptojacking malware can be delivered through phishing emails, malicious downloads, or exploit kits. Website-based cryptojacking often uses JavaScript libraries (like Coinhive, now defunct, or similar) embedded in web pages. These scripts typically mine cryptocurrencies that are ASIC-resistant and can be mined effectively with CPUs, such as Monero. Attackers might target individual computers, servers, or even cloud infrastructure. Detection can involve monitoring CPU usage, network traffic for connections to mining pools, and using anti-malware software or browser extensions with cryptojacking detection capabilities.
Security Warning
Cryptojacking can significantly degrade system performance, lead to higher electricity bills, and potentially damage hardware due to sustained high loads. It can also be a symptom of a broader security compromise.
Caveat
Some websites have experimented with opt-in browser mining as an alternative to ads, but cryptojacking refers specifically to non-consensual use. Differentiating between legitimate high resource usage and cryptojacking can sometimes be challenging without proper tools.

Cryptojacking - Related Articles

No related articles for this term.