Cybercriminals are rampantly “cryptojacking” for profit and personal gain.

Crypto jacking events rose 34,000 percent in 2017, and Symantec blocked 8 million events in December alone of the same year.

Crypto jacking involves hijacking another person’s computer to mine cryptocurrency. Once cryptomining takes hold of a computer, the mining usually goes unnoticed by the victim. As a result, crypto jacking can serve as an easy moneymaking ploy for cybercriminals.

Two Methods of Cryptojacking

Crypto jacking is typically performed through the following two methods:

1. Cryptomining code on computers

Using phishing tactics, hackers can load cryptomining code onto a computer once a victim mistakenly grants unauthorized access.

2. Injecting a script on a website or ad

Victims that visit a certain website or receive pop-ups may unknowingly open a portal for crypto jacking scripts. The mathematical scripts allow the hacker to control a victim’s computer through the hacker’s server.

A few symptoms of cryptojacking include an overloaded processor, slow response times, and/or overheating of the computer or device.

Preventing Cryptojacking

Cryptojacking prevention can be achieved through a variety of measures. The following are some effective methods:

• Security awareness training

Informing employees on crypto jacking, other hacking methods, and good cybersecurity habits can safeguard a company from potential threats.

• Ad-blocking or anti-cryptomining

Installing ad-blocking or anti-cryptomining software can block ads that could contain crypto jacking scripts.

• Web filtering

Web pages that are known or suspected to have crypto jacking scripts can be blocked using web filtering tools.

• Browser extension maintenance

Hackers also use browser extensions for uploading scripts. Therefore, keep track of browser extensions to help prevent cryptojacking.
Because cryptojacking may be the least suspect type of hacking, companies must remain aware to avoid falling victim.

Amplified awareness coupled with strong security can be the lifeline a company needs to keep its network safe.