Close Menu
    X (Twitter)
    Blockchain Journal
    • News
      • Blockchain News
      • Bitcoin News
      • Ethereum News
      • NFT
      • DeFi News
      • Polkadot News
      • Chainlink News
      • Ripple News
      • Cardano News
      • EOS News
      • Litecoin News
      • Monero News
      • Stellar News
      • Tron News
      • Press Releases
      • Opinion
      • Sponsored
    • Price Analisys
    • Learn Crypto
    • Contact
    • bandera
    Facebook X (Twitter) Instagram
    Blockchain Journal
    Home » What is cryptojacking and how does it work? How to avoid becoming a victim of hidden mining?

    What is cryptojacking and how does it work? How to avoid becoming a victim of hidden mining?

    0
    By BlockchainJournal on October 19, 2018 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cryptodocumentation – secret mining of cryptocurrency, in recent months, at first rapidly gained popularity, and then even managed to slightly go out of fashion, returning the palm to traditional extortionate viruses. However, it is too early to relax: this threat is still relevant.

    We bring to your attention a translation of the article by Marty Puranik, founder and CEO of Atlantic.Net, who shares tips on how not to become a victim of cryptodikeking.

    Cryptojacking is the process of unauthorized use of someone else's computers for mining cryptocurrencies . It is not associated with installing spyware or adware, and in this case there is no theft of information from your system. Such software steals computing power for its own purposes, and it is not so easy to detect.

    How it works?

    Hackers use old phishing methods to force users to click on links, as a result of which mining code is downloaded for cryptocurrency. The most popular and effective way is to infect a site with code that is executed independently when the page is loaded by the browser.

    However, the power of individual computers is not enough for effective mining. That's why hackers are targeting cloud services.

    Cryptojacking against cloud services

    Large companies are the main targets for cryptodocking, because they have cloud resources. Hackers choose those cloud services that have weak spots. Surprisingly, some do not even need a password to enter the system!

    Studies show that 49% of databases located in the cloud are not encrypted. Using scanners, hackers are looking for a weak cloud environment on the Internet. So, they can get metadata from public cloud APIs.

    And what, so minit Bitcoin?

    No, the oldest cryptocurrency in the world is best protected from cryptodikeking. Why?

    Because the blockchain technology implements public and monitored records of all transactions. That is, illegal mining on other people's equipment can easily be computed by the community. Therefore, hackers prefer coins with increased anonymity that are difficult to track, such as Zcash or Monero .

    How to protect data centers from cryptodikeking?

    There is no magic pill. The easiest answer is to take care of the correct configuration of the equipment so as not to attract cybercriminals. Businesses should change the basic settings offered by cloud nodes. Cloud environments and containers should also be configured correctly so as not to expose data to risk.

    In February 2018, Tesla reported that it suffered greatly from cryptodikeking. In a company of this magnitude, the overrun of computing power was not noticed. Data centers that do not want to fall into this trap should adjust the parameters so that when the expected levels of electrical power consumption and hashrate are exceeded, an alert will be triggered. This will allow to detect and stop unauthorized mining.

    findings

    Despite the fact that cryptodocking is a relatively new phenomenon in the world of cybercrime, it quickly gained momentum because of its simplicity and rather high yield. Enterprises that do not control their own security and elementary do not monitor energy consumption, risk becoming victims of intruders.


    Bitcoin blockchain Computers Fall Fashion Featured Work Zcash
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    BlockchainJournal

    Related Posts

    ARK Invest Unloads Coinbase and GBTC Shares by Millions Amid Market Boom

    December 6, 20232 Mins Read

    GBTC Discount Shrinks as Bitcoin Price Surges

    December 6, 20232 Mins Read

    IBM Introduces OSO, Designed for Cold Storage of Digital Assets

    December 6, 20232 Mins Read

    Marathon Digital Produced 1,187 Bitcoins in November and Held 14,025 Unrestricted BTC

    December 5, 20232 Mins Read

    Volume Counterfeiting Allegations Rock RATS Token on Gate Exchange

    December 5, 20232 Mins Read

    A New Era for Cryptocurrency: Zodia Custody’s Integration with Harmonize

    December 4, 20232 Mins Read

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 Blockchain Journal

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.