Even though crypto-jacking is still a very new hacking method, it has already become a significant headache for many on the web. Started out by Coinhive group in order to mine Monero in September 2017, it has now become one of the largest cyberthreats. Crypto-jacking has a 35 percent share of all web threats, according to Tyler Moffitt, senior threat researcher at the security firm Webroot.
It is very easy to become the victim of in-browser mining of cryptocurrencies. All the attacker has to do is install a mining module in a victim’s browser, usually without their knowledge or consent, and the attacker will be able to mine a cryptocurrency.
When done with consent, lending your CPU may not pose much damage. Worst case scenarios, however, may involve a slowdown in device processes, can disrupt work, and may even cause physical damage to the devices. Bad news.