As the popularity of Cryptocurrency increases - a new form of malware (malicious soft) has emerged called Cryptojacking.
What is Cryptocurrency? : They are digital currency (e.g. Bitcoin, Ethereum) that can be used in exchange for goods, services, and even real money. Cryptocurrency can be purchased or earned through “mining”.
The term Mining, involves using a computer to solve complex, encrypted math equations in return for a piece of cryptocurrency.
What is Cryptojacking: Cryptojacking occurs when cybercriminals use a victim’s computer, tablet, or mobile device to mine for cryptocurrencies without their knowledge. Unlike most other types of malware, cryptojacking scripts do not normally cause damage to victims’ data. However, Cryptojacking does slow down a victim’s computer and internet connection and can cause battery drain.
How Does Cryptojacking occurs?
- Malicious Applications: Hackers trick victims into loading crypto-mining code onto their computers, through phishing-like tactics. Victims receive a legitimate-looking email that encourages them to click on a link that installs crypto mining software that runs in the background.
- Malicious Websites (Drive-by cryptojacking): Victims visit a site that runs a malicious script or is hosting a malicious advertisement. The script can do one of two things:
- If the website is open, the user’s computer can be used to actively “mine” for cryptocurrency. This "Drive-by" attack can compromise any device with a web browser.
- The website can use a script to install a malicious application without your knowledge
- Github: GitHub is a web-based platform for collaborative software development (software can use code shared on GitHub). Some Hackers will take code that is shared and hide cryptojacking malware within a fork of the project.
How Can I Prevent Cryptojacking Malware
- Here are some helpful preventive measures
- Keep all your software and devices up-to-date with the latest patches and fixes. Many attacks exploit known vulnerabilities in existing software.
- Only install software from trusted sources.
- Avoid suspicious websites (e.g. torrenting, shortened URLs) that can host these malicious scripts.
How Can I Detect and Recover from Cryptojacking
- Symptoms of cryptojacking can include unexpected high processor usage (indicated by sluggish or slow response times) overheating of your device, and poor battery performance
- If you think you are victim of Cryptojacking close all of your browser windows to exit your browser, remove any browser extensions, and run an antivirus scan. If an NJIT owned PC, open the McAfee Endpoint Security application and select “Scan System”. Otherwise, scan your computer using your installed virus protection.
Remember to always stay ALERT ‼️
