Skip to main content
Cryptomining / Cryptojacking

Cryptomining / Cryptojacking


Cryptomining / Cryptojacking

Cryptomining is a system by which "miners" contribute computer processing power and get paid in cryptocurrency to validate blockchain transactions.  In its malicious form, Cryptojacking is where hackers take control of a victim's computing resources to secretly mine cryptocurrency for their own benefit.

Cryptojacking is usually done via a malicious link in an email that loads cryptomining code onto a computer, or by infecting a website or online ad with JavaScript code that once-loaded, auto-executes in the victim's browser. The malware then works in the background as a victim uses their computer normally (unaware of its presence other than potentially slower performance or lags in execution). This activity is attractive to hackers because they can infect multiple computers that then continuously mine for them, and the risk of being caught is lower since the code is surreptitious and can go undetected for a long time. Cryptojacking is different from most other types of malware because, in most cases, it doesn't permanently damage infrastructure or misappropriate victims’ data, however it does steal CPU processing resources. The popularity of both cryptomining and cryptojacking will be closely tied to the price of crypocurrencies which have proven to be highly volatile. 

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

February 07, 2018

Intelligence Bulletin – When Cryptomining Attacks

Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers....

See Details

December 05, 2017

The Risk of Cryptocurrencies

Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary com...

See Details

September 26, 2018

Data is the New Currency

In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment f...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.