A cybercriminal may have several purposes behind the hacking. But, most often the main purpose of hacking for cybercriminals is to gain money illegally. That is why they make or threaten to make DDoS attacks, infect computer systems with ransomware, or make phishing attacks. However, these cybercriminals have recently found another way to solve their purpose by using cryptojacking. What is cryptojacking? How do attackers use cryptojacking to gain money illegally? How does this cryptojacking work and how to prevent it? Let’s understand that in more detail.
In this article, we will discuss the following:
-
What is Cryptojacking?
-
How does Cryptojacking work?
-
Cryptojacking using JavaScript
-
Cryptojacking using a browser extension
-
Cryptojacking through GitHub
-
Cryptojacking through Torrent apps
-
Cryptojacking using Malvertising
-
-
Some examples of Cryptojacking malware
-
Coinhive
-
Crypto-Loot
-
CoinImp
-
Minr
-
deepMiner
-
Smominru Botnet
-
FacexWorm
-
WinstarNssmMiner
-
-
How to detect Cryptojacking?
-
How to prevent Cryptojacking?
-
How to respond to the Cryptojacking attack?
0 Comments