{"id":339,"date":"2022-08-31T06:54:45","date_gmt":"2022-08-31T06:54:45","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=339"},"modified":"2024-06-25T17:20:41","modified_gmt":"2024-06-25T17:20:41","slug":"what-is-cryptojacking-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/","title":{"rendered":"What is Cryptojacking in Cyber Security? | Definition, Examples, etc"},"content":{"rendered":"\n<p>The cybercrime landscape is constantly evolving. Cryptojacking is the latest trend that has created much buzz. Within a year, it has grown threefold, and the cases are constantly on the rise.\u202fUndoubtedly cybercriminals are thriving, but it has made ordinary users contemplate cybersecurity platform that can provide them enhanced security.\u202f&nbsp;<\/p>\n\n\n\n<p>In this article today, We will learn about Cryptojacking meaning, Its process, Some of its examples &amp; More.<\/p>\n\n\n\n<p>So Without further adieu, lets get started!<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Cryptojacking_Definition\" title=\"Cryptojacking Definition\">Cryptojacking Definition<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#is_Cryptojacking_illegal\" title=\"is Cryptojacking illegal?\">is Cryptojacking illegal?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#How_does_cryptojacking_work\" title=\"How does cryptojacking work?&nbsp;\">How does cryptojacking work?&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Download\" title=\"Download\">Download<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Injection\" title=\"Injection\">Injection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Hybrid\" title=\"Hybrid\">Hybrid<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Main_types_of_Cryptojacking\" title=\"Main types of Cryptojacking\">Main types of Cryptojacking<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#1_Browser_based_cryptojacking\" title=\"1. Browser based cryptojacking\">1. Browser based cryptojacking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#2_Host_based_attacks\" title=\"2. Host based attacks\">2. Host based attacks<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Cryptojacking_Example\" title=\"Cryptojacking Example\">Cryptojacking Example<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#1_Coinhive\" title=\"1. Coinhive\">1. Coinhive<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#2_European_water_utility_control_system\" title=\"2. European water utility control system\">2. European water utility control system<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#3_Microsoft_Store\" title=\"3. Microsoft Store\">3. Microsoft Store<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#4_Los_Angeles_Times_Homicide_Report_page\" title=\"4. Los Angeles Times&#8217; Homicide Report page\">4. Los Angeles Times&#8217; Homicide Report page<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#Botnets_are_the_culprit\" title=\"Botnets are the culprit\">Botnets are the culprit<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#How_to_detect_Cryptojacking\" title=\"How to detect Cryptojacking?\">How to detect Cryptojacking?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#What_to_do_when_crypto_mining_is_detected\" title=\"What to do when crypto mining is detected?\">What to do when crypto mining is detected?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#How_to_prevent_cryptojacking\" title=\"How to prevent cryptojacking?\">How to prevent cryptojacking?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#1_Using_Strong_comprehensive_Cybersecurity_Program\" title=\"1. Using Strong comprehensive Cybersecurity Program\">1. Using Strong comprehensive Cybersecurity Program<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#2_Use_Ad_Blocker_and_Disable_JavaScript\" title=\"2. Use Ad Blocker and Disable JavaScript\">2. Use Ad Blocker and Disable JavaScript<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#3_Use_Software_Composition_Analysis_SCA\" title=\"3. Use Software Composition Analysis (SCA)\">3. Use Software Composition Analysis (SCA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#4_Block_Infected_Websites\" title=\"4. Block Infected Websites\">4. Block Infected Websites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#5_Use_Browser_Extensions\" title=\"5. Use Browser Extensions\">5. Use Browser Extensions<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#How_Can_NewEvol_Help_You\" title=\"How Can NewEvol Help You?\">How Can NewEvol Help You?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"Cryptojacking_Definition\"><\/span><strong>Cryptojacking Definition<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Gvkl4tJnbik?si=aX4W_vZb_ww3N3bc\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; \npicture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p class=\"has-text-align-center\">( Source credit: <a href=\"https:\/\/www.youtube.com\/@IDGTECHtalk\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Techtalk<\/a>)<\/p>\n\n\n\n<p>So exactly what is Cryptojacking malware?<\/p>\n\n\n\n<p>Experts define a cryptojacking attack as unauthorized access to a user&#8217;s computer or Mobile device using complex mathematical operations with the purpose of mining cryptocurrency, usually without their knowledge.<\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cryptocurrencies<\/a> are attracting more investors each passing day. This has further propelled the malicious cryptojacking activity. In cryptojacking, cybercriminals mine crypto coins through hacked computers. In simpler terms, hijackers use someone\u2019s machine, processing power, battery life and memory to mine cryptocurrency.\u202f&nbsp;<\/p>\n\n\n\n<p>This adversely impacts the device\u2019s performance and exposes it to insecure networks, putting device data at greater risk. In some cases, it exhausts devices to reduce their lifespan. It is like using the neighbour\u2019s electricity connection to light up your own home.\u202f&nbsp;<\/p>\n\n\n\n<p>Therefore, the need for a robust cybersecurity platform has arisen that can protect devices against such illegitimate use.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"is_Cryptojacking_illegal\"><\/span><strong>is Cryptojacking illegal?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Yes, it is!<\/p>\n\n\n\n<p>It&#8217;s where cryptojackers take unauthorized access to somebody else&#8217;s computer for cryptocurrency mining by exploiting vulnerabilities or by installing some kind of malicious cryptojacking software to harness computing power without obtaining the consent of a user.<\/p>\n\n\n\n<p>These bad practices can cause significant harm by slowing down your devices increasing electricity costs &amp; violating laws related to unauthorized access &amp; theft of services in many jurisdictions worldwide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"How_does_cryptojacking_work\"><\/span><strong>How does cryptojacking work?<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Download\"><\/span><li>Download<\/li><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download.webp\" alt=\"A Black Down Arrow \" class=\"wp-image-1188\" style=\"width:154px;height:auto\" srcset=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download.webp 256w, https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download-150x150.webp 150w, https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download-24x24.webp 24w, https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download-48x48.webp 48w, https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/download-96x96.webp 96w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/figure>\n\n\n\n<p>Typically involves malware being downloaded in the victim&#8217;s computer generally via websites or email attachments containing cryptojacking code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Injection\"><\/span><li>Injection<\/li><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the malware is on the device, it injects itself into the system and web browsers to hijack computing power for cryptocurrency mining without the user&#8217;s consent.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hybrid\"><\/span><li>Hybrid<\/li><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This involves using the combination of both download and injection techniques to maximize the effectiveness of the attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"Main_types_of_Cryptojacking\"><\/span><strong>Main<\/strong> <strong>types of Cryptojacking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Browser_based_cryptojacking\"><\/span>1. <strong>Browser based cryptojacking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This method usually involves running malicious scripts or injecting them into legitimate websites visited by users via web browsers by using the power of the devices of visitors.<\/p>\n\n\n\n<p>Users remain unaware that their Computing resources are being exploited, which leads to slow &amp; poor performance and increased energy consumption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Host_based_attacks\"><\/span>2. <strong>Host based attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In this, the attacker directly installs the malware on the victim&#8217;s computer or server which runs in the background using the resources of the host with the aim of cryptomining without the permission of the users.<\/p>\n\n\n\n<p>There is a high chance of your sensitive information getting compromised if the malware spreads across the network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"Cryptojacking_Example\"><\/span><strong>Cryptojacking Example<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Below are some of the victims according to the ENISA 2021 threat landscape report.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Coinhive\"><\/span><strong>1. Coinhive<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Coinhive became extremely popular due to being widely used in cryptojacking attacks!<\/p>\n\n\n\n<p>For instance, in 2018, many <a href=\"https:\/\/www.theguardian.com\/technology\/2018\/feb\/11\/government-websites-hit-by-cryptocurrency-mining-malware\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Government websites<\/a> in countries like the UK, USA, and Australia were found to be compromised using cryptojacking scripts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_European_water_utility_control_system\"><\/span>2. <strong>European water utility control system<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This took place in&nbsp; 2021 when the hackers reportedly targeted the <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-critical-infrastructure\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">water utility control system in Europe using ransomware attacks<\/a>, which sometimes involve threats of cryptocurrency demands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Microsoft_Store\"><\/span>3. <strong>Microsoft Store<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/Microsoft-logo.webp\" alt=\"Microsoft logo\" class=\"wp-image-1189\" style=\"width:219px;height:auto\" srcset=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/Microsoft-logo.webp 600w, https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/Microsoft-logo-300x200.webp 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>In Jan 2020, <a href=\"https:\/\/threatpost.com\/eight-cryptojacking-apps-booted-from-microsoft-store\/141896\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">8 apps from the Microsoft Store were found to be secretly mining Monero cryptocurrency<\/a> in the background by pretending to be a computer system utilities &amp; image file converter tool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Los_Angeles_Times_Homicide_Report_page\"><\/span><strong>4. Los Angeles Times&#8217; Homicide Report page<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In 2018, the <a href=\"https:\/\/threatpost.com\/cryptojacking-attack-found-on-los-angeles-times-website\/130041\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Los Angeles Times Homicide Report page was compromised with Coinhive&#8217;s JavaScript code<\/a>, which was found out later after the users complained about their system getting slower after visiting the webpage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"Botnets_are_the_culprit\"><\/span><strong>Botnets are the culprit<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It has been observed that cryptojacking is facilitated through botnets that target vulnerabilities in internet-connected systems. This includes web servers, VPN gateways and even platforms that deliver cloud applications.\u202f&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"How_to_detect_Cryptojacking\"><\/span><strong>How to detect Cryptojacking?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Deteriorated system &amp; device performance or overheating are some of the most common symptoms of crypto mining malware. However, being common in nature, they can be difficult to detect &amp; overlooked quite easily. If you encounter any of the below-mentioned situations, you should start investigating into possibilities of cryptojacking:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Slow or deteriorated system performance&nbsp;<\/li>\n\n\n\n<li>Overheating&nbsp;<\/li>\n\n\n\n<li>Sharp increase in central processing unit (CPU) usage without any reason\u202f&nbsp;<\/li>\n\n\n\n<li>If something in the system changes on its own\u202f&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"What_to_do_when_crypto_mining_is_detected\"><\/span><strong>What to do when crypto mining is detected?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In the case of in-browser JavaScript attacks, immediately kill the browser tab running the cryptojacking script. Note the website URL. You can block it by updating the company\u2019s web filters. Several anti-crypto mining tools can help you prevent attacks of this nature in future.\u202f&nbsp;<\/li>\n\n\n\n<li>Sometimes, the browser is infected by an extension. Even after closing the tab, the problem will not be resolved in such a situation. Remove unrequired extensions and update all the extensions.&nbsp;<\/li>\n\n\n\n<li>Think from the attacker\u2019s perspective and find the loose ends that might help him hijack your system.\u202f&nbsp;<\/li>\n\n\n\n<li>Introduce advanced cybersecurity tools such as the <a href=\"https:\/\/www.newevol.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">NewEvol platform<\/a> to provide 360-degree protection to your system.\u202f<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"How_to_prevent_cryptojacking\"><\/span><strong>How to prevent cryptojacking?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Using the below methods &amp; best practices can help to prevent all types of malware attacks!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Using_Strong_comprehensive_Cybersecurity_Program\"><\/span><strong>1. Using Strong comprehensive Cybersecurity Program<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Includes regularly updating your antivirus and anti-malware network security software, Which will help you detect malicious code and block attempts before they compromise your system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Use_Ad_Blocker_and_Disable_JavaScript\"><\/span>2. <strong>Use Ad Blocker and Disable JavaScript<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2024\/06\/ad-blockers.webp\" alt=\"Screenshot of Chrome browser settings page displaying various options and preferences\" class=\"wp-image-1190\" style=\"width:244px;height:auto\"\/><\/figure>\n\n\n\n<p>Useful in preventing scripts from running into your browser which often gets embedded in ads or websites without knowledge.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Use_Software_Composition_Analysis_SCA\"><\/span><strong>3. Use Software Composition Analysis (SCA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Helps in identifying and managing open-source components and libraries in your software stack, which you need to keep updating to reduce the risks of a vulnerability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Block_Infected_Websites\"><\/span><strong>4. Block Infected Websites<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Avoid visiting websites that you find to be suspicious or untrustworthy.<\/p>\n\n\n\n<p>Always make a habit of following a cautious approach to your browsing to prevent inadvertent exposure to such threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Use_Browser_Extensions\"><\/span><strong>5.<\/strong> <strong>Use Browser Extensions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Using an extension such as CoinBlockerLists will help you detect &amp; block scripts from running in your browser without your permission.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#065c62\"><span class=\"ez-toc-section\" id=\"How_Can_NewEvol_Help_You\"><\/span><strong>How Can NewEvol Help You?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Looking to effectively manage and defend your organization against cryptojacking activities?<\/p>\n\n\n\n<p>Check our products like the <a href=\"https:\/\/www.newevol.io\/product\/cyber-security-information-event-management.php\"><u><b>SIEM solution<\/b><\/u><\/a> for real-time monitoring, <strong><a href=\"https:\/\/www.newevol.io\/product\/security-orchestration-automation-response-soar.php\"><u>SOAR solution<\/u><\/a><\/strong> for automated incident response, <strong><a href=\"https:\/\/www.newevol.io\/product\/data-lake-solutions.php\"><u>Data Lake solution<\/u><\/a> <\/strong>for centralized data analysis, <a href=\"https:\/\/www.newevol.io\/product\/cyber-threat-intelligence.php\"><strong><u>cyber threat intelligence solutions<\/u><\/strong><\/a> for proactive threat detection, <a href=\"https:\/\/www.newevol.io\/solutions\/security-operations.php\"><strong><u>Security operations platform<\/u><\/strong><\/a> to identify anomalies &amp; <a href=\"https:\/\/www.newevol.io\/solutions\/threat-hunting.php\"><strong><u>threat hunting platform<\/u><\/strong><\/a> to search for the signs of any malicious activity.<\/p>\n\n\n\n<p>These tools will not only help you in seeking but also in mitigating cryptojacking threats.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybercrime landscape is constantly evolving. Cryptojacking is the latest trend that has created much buzz. Within a year, it has grown threefold, and the cases are constantly on the rise.\u202fUndoubtedly cybercriminals are thriving, but it has made ordinary users contemplate cybersecurity platform that can provide them enhanced security.\u202f&nbsp; In this article today, We will&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\">Continue reading <span class=\"screen-reader-text\">What is Cryptojacking in Cyber Security? | Definition, Examples, etc<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":1193,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[64,46],"class_list":["post-339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-siem","tag-cryptojacking-2","tag-cybersecurity-platform","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cryptojacking in Cyber Security? | Definition, Examples, etc<\/title>\n<meta name=\"description\" content=\"Discover the threat of cryptojacking and how it jeopardizes online security. Learn how to protect your devices from this stealthy cybercrime.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Cryptojacking - The Beginner&#039;s Guide\" \/>\n<meta property=\"og:description\" content=\"A complete guide to Cryptojacking. How a Robust Cybersecurity platform can save you from Cryptojacking. Let&#039;s learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T06:54:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T17:20:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/complete-guide-cryptojacking-2022-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1202\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krunal Medapara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What Is Cryptojacking - The Beginner&#039;s Guide\" \/>\n<meta name=\"twitter:description\" content=\"A complete guide to Cryptojacking. How a Robust Cybersecurity platform can save you from Cryptojacking. Let&#039;s learn more.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/complete-guide-cryptojacking-2022-scaled.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@krunalpatel17\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krunal Medapara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\",\"name\":\"What is Cryptojacking in Cyber Security? | Definition, Examples, etc\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp\",\"datePublished\":\"2022-08-31T06:54:45+00:00\",\"dateModified\":\"2024-06-25T17:20:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\"},\"description\":\"Discover the threat of cryptojacking and how it jeopardizes online security. Learn how to protect your devices from this stealthy cybercrime.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp\",\"width\":2048,\"height\":961,\"caption\":\"what is cryptojacking in cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cryptojacking in Cyber Security? | Definition, Examples, etc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\",\"name\":\"Krunal Medapara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"caption\":\"Krunal Medapara\"},\"description\":\"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.\",\"sameAs\":[\"https:\/\/www.newevol.io\/\",\"https:\/\/x.com\/krunalpatel17\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cryptojacking in Cyber Security? | Definition, Examples, etc","description":"Discover the threat of cryptojacking and how it jeopardizes online security. Learn how to protect your devices from this stealthy cybercrime.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What Is Cryptojacking - The Beginner's Guide","og_description":"A complete guide to Cryptojacking. How a Robust Cybersecurity platform can save you from Cryptojacking. Let's learn more.","og_url":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2022-08-31T06:54:45+00:00","article_modified_time":"2024-06-25T17:20:41+00:00","og_image":[{"width":2560,"height":1202,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/complete-guide-cryptojacking-2022-scaled.jpg","type":"image\/jpeg"}],"author":"Krunal Medapara","twitter_card":"summary_large_image","twitter_title":"What Is Cryptojacking - The Beginner's Guide","twitter_description":"A complete guide to Cryptojacking. How a Robust Cybersecurity platform can save you from Cryptojacking. Let's learn more.","twitter_image":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/complete-guide-cryptojacking-2022-scaled.jpg","twitter_creator":"@krunalpatel17","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"Krunal Medapara","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/","url":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/","name":"What is Cryptojacking in Cyber Security? | Definition, Examples, etc","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp","datePublished":"2022-08-31T06:54:45+00:00","dateModified":"2024-06-25T17:20:41+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680"},"description":"Discover the threat of cryptojacking and how it jeopardizes online security. Learn how to protect your devices from this stealthy cybercrime.","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/08\/what-is-cryptojacking-in-cyber-security.webp","width":2048,"height":961,"caption":"what is cryptojacking in cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-cryptojacking-in-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"What is Cryptojacking in Cyber Security? | Definition, Examples, etc"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680","name":"Krunal Medapara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","caption":"Krunal Medapara"},"description":"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.","sameAs":["https:\/\/www.newevol.io\/","https:\/\/x.com\/krunalpatel17"],"url":"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":54,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/339\/revisions"}],"predecessor-version":[{"id":1191,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/339\/revisions\/1191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/1193"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}