Cryptojackingattack 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

CRYPTO JACKING ATTACK

Presented by:

Margelyn Beltran
Kolin Francheska Braza
Flore May Himaya
Ernesto Basalo
Angel Mark Traje
John Paul Cornillo
Japhet Rocero
What is crypto jacking?

Crypto jacking is the unauthorized use of a computer or device to mine


cryptocurrency.

It o en occurs through malicious so ware or scripts without the user's knowledge.

Criminals exploit resources for financial gain, posing serious security risks to
individuals and organizations.
How does a crypto jacking
attack work?
Crypto jacking works by hackers infiltrating a device or network to mine
cryptocurrency without the owner's consent or knowledge.

Attackers o en use malicious scripts injected into websites or so ware to exploit


processing power, consuming system resources and causing performance issues.
Common targets of crypto jacking
attacks
Websites with high traffic: Crypto jacking attackers target websites with significant traffic to maximize
their mining activities without being noticed.

Public Wi-Fi networks: Devices connected to public Wi-Fi are vulnerable to crypto jacking attacks due to
lax security measures.

Enterprise networks: Large organizations are prime targets as their extensive resources can support
extensive mining operations.
Signs of a crypto jacking attack
1 Increased CPU Usage
One of the early signs is a noticeable increase in CPU usage on devices or servers,
leading to slower performance.

2 Overheating Devices
Crypto jacking can cause devices to overheat due to the constant processing required
for cryptocurrency mining activities.

3 Unexplained Slowdown
Users may experience unexplained slowdowns in system speed and performance,
especially during web browsing or using certain applications.
Impact of crypto jacking attacks
Financial Loss System Downtime Security Risks

Crypto jacking attacks can Crypto jacking can cause Crypto jacking exposes
result in significant financial system slowdowns and sensitive data and
losses for individuals and unexpected downtime, compromises network
organizations. affecting productivity and security, putting confidential
disrupting normal operations. information at risk of the or
Running cryptomining scripts
exploitation.
consumes electricity and It can also lead to hardware
reduces system efficiency, wear and tear, reducing the It undermines the trust and
leading to increased lifespan of affected devices. confidence of users and
operational costs. customers, impacting the
reputation of affected
businesses.
Preventive measures against crypto
jacking
Use ad-blocking and anti- Keep software updated
cryptomining extensions Regularly update operating systems,
Install browser extensions that block crypto browsers, and security so ware to patch
jacking scripts from running on websites. vulnerabilities.

Monitor CPU usage Educate employees


Watch for unusually high CPU usage, which Train staff on the risks of crypto jacking and
can be a sign of crypto jacking. the importance of cautious browsing.
Best practices for detecting and
mitigating crypto jacking attacks

Continuous Firewall Regular Employee


Monitoring Configuration Patching Education
Implement real-time Configure firewalls to Keep so ware and Train employees to
monitoring to detect block known crypto applications updated recognize and report
unauthorized jacking domains and to address suspicious activities
cryptocurrency IP addresses. vulnerabilities that may indicate a
mining activities on exploited by crypto crypto jacking attack.
your network. jacking malware.
Case studies of notable crypto jacking
attacks

NotPetya Ransomware Coinhive Crypto Wannamine Crypto


Attack Jacking Jacking Malware
The NotPetya ransomware Coinhive, a popular in-browser Wannamine malware infected
attack targeted Ukrainian cryptocurrency mining service, government websites, secretly
businesses, leading to was used for unauthorized using their visitors' computing
widespread financial and crypto jacking on numerous power for crypto jacking.
operational disruptions. websites.
Legal and ethical implications of
crypto jacking
Legal Responsibility User Consent Data Privacy
Ethical concerns arise Crypto jacking raises
Website owners may be regarding the lack of concerns about the
legally liable for allowing explicit consent from users security and privacy of
unauthorized use of their for utilizing their devices user data being utilized for
visitors' computing power for mining. mining activities.
for mining.
Advantages

Stealthy Nature: Cryptojacking attacks can often go unnoticed by victims for


extended periods since they typically involve utilizing a small portion of the
victim's CPU or GPU resources, minimizing the impact on the device's
performance.

Low Risk for Attackers: Compared to other cyberattacks like ransomware or


data breaches, cryptojacking carries relatively low risk for attackers. There's no
need to interact with the victim or steal sensitive data directly, reducing the
likelihood of legal consequences.

Potential Profitability: If the attack targets a large number of devices or a high-


performance system, the cumulative mining power can generate significant
profits for attackers, especially if they exploit the resources over an extended
period.
Disadvantages:

Legal and Ethical Concerns: Cryptojacking is illegal and unethical. Unauthorized


use of someone else's computing resources can lead to legal repercussions for
attackers if caught. Moreover, it violates the victim's privacy and can damage trust
in online services.

Damage to Victim Systems: Intensive cryptocurrency mining can significantly


degrade the performance of victim devices, leading to overheating, reduced
lifespan of hardware components, and increased energy consumption. In extreme
cases, it can cause hardware failure.

Reputation Damage: Organizations that fall victim to cryptojacking attacks may


suffer reputational damage. Customers and stakeholders may lose trust in the
company's ability to protect their systems and data, leading to financial losses
and a damaged brand image.
Conclusion and key
takeaways
Crypto jacking attacks can have significant financial and operational
consequences for organizations, making it crucial to implement robust security
measures to detect and prevent such threats.

Regularly monitoring system performance and keeping so ware up-to-date are


essential practices to safeguard against crypto jacking.

Increasing Trend: Cryptojacking incidents have been on the rise due to the growing popularity of cryptocurrencies and the ease of deploying
cryptojacking scripts.Keep your devices and software updated. ...
Install software from reputable sources. ...
Avoid suspicious websites. ...
Use ad blockers in your browser. ...
Disable JavaScript in your browser. ...
Endpoint protection.

You might also like