The looming threat of crypto-jacking

Even though crypto-jacking is still a very new hacking method, it has already become a significant headache for many on the web. Started out by Coinhive group in order to mine Monero in September 2017, it has now become one of the largest cyberthreats. Crypto-jacking has a 35 percent share of all web threats, according to Tyler Moffitt, senior threat researcher at the security firm Webroot.

THE SCOOP

Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

It is very easy to become the victim of in-browser mining of cryptocurrencies. All the attacker has to do is install a mining module in a victim’s browser, usually without their knowledge or consent, and the attacker will be able to mine a cryptocurrency.

When done with consent, lending your CPU may not pose much damage. Worst case scenarios, however, may involve a slowdown in device processes, can disrupt work, and may even cause physical damage to the devices. Bad news.