Professional Documents
Culture Documents
Cryptojackingattack 1
Cryptojackingattack 1
Cryptojackingattack 1
Presented by:
Margelyn Beltran
Kolin Francheska Braza
Flore May Himaya
Ernesto Basalo
Angel Mark Traje
John Paul Cornillo
Japhet Rocero
What is crypto jacking?
Criminals exploit resources for financial gain, posing serious security risks to
individuals and organizations.
How does a crypto jacking
attack work?
Crypto jacking works by hackers infiltrating a device or network to mine
cryptocurrency without the owner's consent or knowledge.
Public Wi-Fi networks: Devices connected to public Wi-Fi are vulnerable to crypto jacking attacks due to
lax security measures.
Enterprise networks: Large organizations are prime targets as their extensive resources can support
extensive mining operations.
Signs of a crypto jacking attack
1 Increased CPU Usage
One of the early signs is a noticeable increase in CPU usage on devices or servers,
leading to slower performance.
2 Overheating Devices
Crypto jacking can cause devices to overheat due to the constant processing required
for cryptocurrency mining activities.
3 Unexplained Slowdown
Users may experience unexplained slowdowns in system speed and performance,
especially during web browsing or using certain applications.
Impact of crypto jacking attacks
Financial Loss System Downtime Security Risks
Crypto jacking attacks can Crypto jacking can cause Crypto jacking exposes
result in significant financial system slowdowns and sensitive data and
losses for individuals and unexpected downtime, compromises network
organizations. affecting productivity and security, putting confidential
disrupting normal operations. information at risk of the or
Running cryptomining scripts
exploitation.
consumes electricity and It can also lead to hardware
reduces system efficiency, wear and tear, reducing the It undermines the trust and
leading to increased lifespan of affected devices. confidence of users and
operational costs. customers, impacting the
reputation of affected
businesses.
Preventive measures against crypto
jacking
Use ad-blocking and anti- Keep software updated
cryptomining extensions Regularly update operating systems,
Install browser extensions that block crypto browsers, and security so ware to patch
jacking scripts from running on websites. vulnerabilities.
Increasing Trend: Cryptojacking incidents have been on the rise due to the growing popularity of cryptocurrencies and the ease of deploying
cryptojacking scripts.Keep your devices and software updated. ...
Install software from reputable sources. ...
Avoid suspicious websites. ...
Use ad blockers in your browser. ...
Disable JavaScript in your browser. ...
Endpoint protection.