Crypto J
Crypto J
Crypto J
M. Shoaib Shabir
Mashhood Aslam
Submitted To
AP Dr Shahzaib Tahir Butt
Outlines
Many names
Cryptojacking
Coinmining
Cryptomining
(“Coinhive” is the name of the best-known
software that performs this attack)
Introduction:
Hackers do this by either getting the victim to click on a malicious link in an email
that loads crypto mining code on the computer, or by infecting a website or
online ad with JavaScript code that auto-executes once loaded in the victim’s
browser.
Either way, the cryptomining code then works in the background as unsuspecting
victims use their computers normally. The only sign they might notice is
slowerm performance or lag in execution.
How it works?
How it works?
One is to trick victims into loading cryptomining code onto their computers. This is
done through phishing-like tactics or email encouraging them to click on link.
Second one is to inject a script on a website or an ad that is delivered to multiple
websites. Once victims visit the website or the infected ad pops up in their browsers,
the script automatically executes.
They do steal CPU processing resources, slowing down the machine’s performance.
How to detect Crypto Jacking?
Use endpoint protection that is capable of detecting known crypto miners which
is provided by many anti-virus software vendors.
In February 2018, Bad Packets Report found 34,474 sites running Coinhive, the most
popular JavaScript miner that is also used for legitimate cryptomining activity.
risk of being caught and identified is also much less than with ransomware.
Crypto Jacking Challenges for
Hackers
Internet access
Persistence
Cryptojacking Companies
Coinhive
JSEcoin
Cryptoloot
The companies split the profits with the web page owner. These products
are legal, and being offered as a substitute for advertising revenue.
However, the web site owners don’t have to tell the users.
The Business Cost of Crypto Jacking
Lists of Sites Being Affected
.
Conclusion
More cryptojacking malware will likely to be seen over the next few
years.