What is cryptojacking and how does it work?
Here’s the skinny on this sneaky way hackers mine for crypto
Cryptojacking is when a hacker uses a victim’s desktop or laptop to generate cryptocurrency. This happens when the victim unwittingly installs a malicious code that enables a cyber criminal to access their device.
This can happen when a victim clicks on an unknown link on a webpage or phishing email. The cyber criminal then uses this malware, known as a coin miner, to mine cryptocurrencies.
Cryptocurrencies are digital currencies, so the hacker only needs malware and a victim’s device to mine them.
How does cryptojacking work?
Cyber criminals have several means to get a victim's computer to start mining cryptocurrency.
The first is to deceive victims into loading crypto mining code onto their PCs, often through a phishing email.
The victim gets a legitimate-looking email that urges them to click on a link. The link then runs a script on the computer that mines cryptocurrencies in the background unbeknownst to the victim.
The second method is to place a script on a website or an ad delivered to several websites. When a victim visits an affected website or clicks on an infected ad, the script automatically runs.
Either way, code is not stored on the victim’s device; all it does is run complex mathematical problems and sends the results to a server under the cyber criminal’s control.
Some scripts have worm-like abilities, so they can infect more devices on the same network, maximizing returns for the hacker. This also makes it more difficult to remove.
According to security researchers at AT&T, such worms can also change their scripts to run in different computer architectures, such as x86, x86-64 and aarch64. Hackers loop through different scripts until one works. Then a cron job ensures the script will have persistence on a device or kill off the script if it gets detected.
Cryptomining scripts can also check if other competing crypto mining malware has been cryptojacking a device. If it detects other scripts, it can disable them to run its script instead.
Why is cryptojacking a problem?
Cryptojacking seems like a victimless crime, as no damage is done to a victim’s computer and no data is stolen.
What is stolen is the resources available to a computer in terms of CPU or GPU cycles. Using computing power in this way is criminal and done without the knowledge or consent of the victim to benefit the hacker who then makes money from this activity.
While an individual may be annoyed with a slower computer, enterprises may incur costs arising from help desk tickets and IT support time in finding and fixing problems with slow computers. It can also result in much higher electricity bills for companies affected.
Why is cryptojacking popular?
Cryptojacking is a recent phenomenon compared to other cyber crime, as it rose to prominence in 2017 when Bitcoin’s value was increasing rapidly.
The number of attacks appears to follow the value of cryptocurrency. According to an Enisa report, there was a 30% year-on-year increase in the number of cryptojacking incidents in 2020.
X-Force Threat Intelligence Index
Top security threats and recommendations for resilienceFree download
The same report said Monero (XMR) was the cryptocurrency of choice for 2019 cryptojacking activities because of its focus on privacy and anonymity. This means Modero transactions cannot be traced. Also, Monero designed its proof-of-work algorithm to make mining viable with a standard CPU instead of specialized hardware. This ASIC-resistant mining algorithm makes it perfect for machines infected with cryptojacking malware.
Overall, cryptojacking is popular because it doesn’t need a connection to a command-and-control server operated by the hacker. It can also go undetected for a very long time, so hackers can make money anonymously without fear of law enforcement knocking on their doors.
Another motivation is money — cryptojacking is cheap. According to a report from Digital Shadows, kits to get you started in cryptojacking cost as little as $30. In one campaign, hackers made as much as $10,000 per day from crypto mining.
What are some real-life examples of cryptojacking?
In 2018, cryptojacking code was found hidden within the Los Angeles Times' Homicide Report page. This also mined Monero.
Another high-profile victim of cryptojacking was Tesla. An investigation by cyber security firm Redlock found that hackers had infiltrated Tesla’s Kubernetes console which was not password protected. They installed mining pool software and configured the malicious script to connect to an “unlisted” or semi-public endpoint.
In 2018, Trend Micro observed a group of hackers it called Outlaw trying to run a script in one of Trend Micro’s IoT honeypots. By the end of the same year, the hackers had over 180,000 compromised hosts under their control.
In 2020, Palo Alto Networks discovered a cryptojacking scheme that used Docker images to install cryptomining software on victims’ systems. The cyber criminals inserted code within Docker images to avoid detection. The infected images helped criminals mine cryptocurrency worth an estimated $36,000.
What are some known cryptojacking malware?
There are quite a few examples of cryptojacking malware. Some examples include:
- Smominru: This cryptojacker compromises Windows machines using an EternalBlue exploit and brute-force on various services, including MS-SQL, RDP, Telnet, and many others.
- Badshell: This uses fileless techniques and hides in Windows processes.
- Coinhive: This was a legitimate website monetization tool but is the world’s largest cryptojacking threat.
- MassMiner: This is a cryptocurrency-mining malware that has been spotted using worm-like capabilities to spread through multiple exploits.
How do you know if you are a victim of cryptojacking?
Cryptojacking is virtually undetectable in most cases. However, there are a few signs that your computer could be a victim, including the computer heating up, making loud fan noises, draining batteries faster than usual, decreased performance, shutting down due to lack of available processing power.
You should consider closing and blocking any website suspected of running cryptojacking scripts if you see these symptoms. You should also update or delete any questionable browser extensions.
Can you prevent your devices from being a victim of cryptojacking?
Prevention is always better than cure, and there are a few things users can do to prevent their machines from succumbing to a cryptojacking incident.
Among them is installing an ad-blocker, as most of them can prevent cryptojacking scripts. You should also keep your systems updated with the latest software and patches for your operating system and all applications — particularly web browsers. Many attacks exploit known flaws in existing software.
Organizations can make a list of URL/IPs of infected cryptojacking sites and domains of crypto-mining pools to block. They can also implement network system monitoring to identify excessive resource usage.
ZTNA vs on-premises VPN
How ZTNA wins the network security gameFree Download
The global use of collaboration solutions in hybrid working environments
How companies manage security risksFree Download
How to build a cyber-resilient business ready to innovate and thrive
Outperform your peers in your successful business outcomesFree Download
Accelerating your IT transformation
How Cloudflare is innovating for CIOs to start 2023Watch now