Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

What is Cryptojacking?

Written by  May 08, 2020

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency for profit.

The original form of cryptojacking would involve the victim unknowingly installing software on their computer that would run in the background, solving algorithms to generate units of a cryptocurrency that would go back into the wallet of a hacker.

Nowadays, you can be cryptojacked simply by visiting a website in your browser, instead of program having to be installed as previously.

Cryptojacking-Malware

How does it work?

The original form of cryptojacking is similar to any ‘standard’ malware attack. A user will be tricked into installing malicious software on their computer which will then have access to their system.

With cryptojacking specifically, this software will quietly take a portion of your computer’s processing power and use it to solve complicated algorithms. When these algorithms are completed units of cryptocurrency are deposited into a wallet, usually, one associated with the writing of the program.

There is a slightly positive side to this, as these programs are designed to be discrete and stealthy to avoid detection and so you shouldn’t notice any change in your computer at all if you have one - so at least this particular brand of malware isn’t going to make your computer inoperable as some others do.

Cryptojacking whilst browsing

The more alarming part about cryptojacking is that it can be done in-browser and doesn’t require a download or installation. Simply visiting a website will result in the code automatically running and using your computer’s resources.

The scripts that allow the cryptojacking to take place are buried within the Javascript on the website, and as JavaScript is found on almost every website it can crop up almost anywhere.

Interestingly enough, this method has been cited as a potential replacement for display advertising - so rather than seeing a bunch of advertisements on a website, it will instead use a very small percentage of your CPU to complete algorithms while you’re viewing the page.

This would, of course, have to be something you’d need to agree to, but there are a few websites that will just do it without asking for your consent and this is what is known as in-browser cryptojacking.

Advertisement

Avoiding cryptojacking

Avoiding local cryptojacking (from software that has been installed on your PC follows the same process as avoiding any other malware or virus.

Getting a good antivirus is always essential and something everyone should have.

Avoiding cryptojacking from a website is going to be more challenging unless you want to go digging in the source code each time you load up a web page. If a website is limiting the number of resources it is drawing from your computer then you shouldn’t notice much change, but if it’s trying to draw as much power as possible then you could notice your device’s performance becoming sluggish or the fan speed increasing.

You can download a cryptojacking blocker to stop any of these scripts running in your browser. This blocker will take the form of a browser extension and stop any websites using your computer for cryptocurrency mining.

If you are new to the Cryptocurrency world and would like to open an account we recommend Cex.io.

Do you find this article useful? Comment below or follow us on Facebook or Twitter.

Paul Saunders

Crypto tech journalist, Paul specialises in Crypto news having worked and traded in the field for over 5 years and has previous Blockchain admin roles to his credit. His knowledge and experience in Crypto tech is very important to us and his contribution is invaluable.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Follow Us

Advertisement

Help and Advice

May 06, 2020

Beginners Guide To Cryptocurrency

Cryptocurrency has been around since 2009 and has grown in popularity ever since. But if you’re a beginner in the cryp...

Feb 10, 2020

Tips To Trade The Volatile Crypto Market

The expected economic impact of the coronavirus has resulted in crashing stock markets across all the globe. ...

May 08, 2020

What is Cryptojacking?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency for profit. ...

May 26, 2020

Ways to invest in the cryptocurrency market

Bitcoins huge price movement back in 2017 attracted many investors who wanted to profit from the emergence of this new d...

May 11, 2020

What is an ICO?

An ICO stands for Initial Coin Offering, it is a method for teams to raise funds for a project in the cryptocurrency spa...

Jun 24, 2020

The difference between Bitcoin, Altcoins and Tokens

The cryptocurrency market is well established, but then there are new people discovering the benefits of crypto trading ...

Feb 20, 2020

How VPN Services Protect Your Data

Wherever you are, a virtual private network is still one of the best ways to secure your crypto data on the internet. ...

Jan 31, 2020

Tips on keep your mobile banking apps secure

If you are buying and selling cryptocurrency and need to fund your investments or withdraw your money, it always pays to...

Jan 13, 2020

Be wary of shoulder surfing

When you are trading in the office this is rarely a problem as you know your colleagues and you are in an enclosed envir...

May 11, 2020

How to protect your Gmail account

Technology is constantly changing and at a pace which is hard to keep up with, but 'safety first' always applies. ...

Apr 06, 2020

Every new crypto computer needs protecting

All those crypto files you’ve saved through the years that you can’t remember what they are? Goodbye, it wasn’t me...

Feb 07, 2020

Is 2 Factor Authentication Enough?

The technology and security controls in every example is different and therefore, the time, effort, and cost required to...

Jan 08, 2020

What you need to know about filing Crypto taxes in the UK

For some time, Governments across the world have been cracking down on crypto taxes.

Feb 21, 2020

Proton Mail: The Best Secure email Provider there is

Proton Mail offers a comprehensive level of security, while also locating its data centres ‘underneath 1000 meters of ...

Jan 15, 2020

How to secure your router from Cyber Attacks

Hackers nowadays are seen using routers as botnets to launch cyber attacks on large companies and organisations. ...

Feb 17, 2020

What is a Trojan?

As the name suggests, Backdoor Trojans are designed to grant an external user full control over a system by creating a b...