What is cryptojacking and how does it work?

In “ cryptojacking ” (from the English “to hijack” for “to kidnap”), hackers inject hidden programs onto other people’s computers use their power for “ mining

Victims unknowingly download the programs onto their computers by, for example, clicking on an unknown link in an email or visiting an infected website. These “ coin miners ” are then used by the criminals to create or “mine” cryptocurrencies The use of computing power for this criminal purpose takes place without the knowledge or consent of the victim.

While the problem may seem harmless at first glance, stealing computing power from victims of cryptojacking not only affect the performance of their PC or smartphone, but can also cause high costs for the affected individuals and companies, as coin mining uses a lot of electricity .

What are cryptocurrencies?

Cryptocurrencies are digital assets or means of payment, usually based on a decentralized, always distributed and cryptographically secured payment system. Asset attributions are usually recorded in a blockchain , coins (digital coins) or tokens can be transferred to a wallet - a type of digital wallet. The best-known cryptocurrencies include BitCoin, Monero and Ripple.

To put it simply, they are created when a PC highly complex mathematical problems . For each solution you get a “coin” or a unit of a cryptocurrency credited to your hard drive. Normal computers now require several days or even weeks for so-called mining because the complexity of the calculation tasks increases with the amount of crypto money. A corresponding amount of computing power is required to create cryptocurrencies . This makes “hijacking” PCs , smartphones, tablets or other Internet of Things devices (IoT devices) lucrative for cybercriminals because there is no need to purchase your own expensive hardware.

Signs of cryptojacking

  • A noticeable slowdown or decrease in device performance
  • Overheating of the device (or battery) or increased use of the ventilation
  • Devices shutting down due to lack of available computing power
  • Decreasing the productivity of your device or router
  • Reduced CPU performance
  • Unexpected increase in electricity costs due to increased energy consumption

How to protect yourself from cryptojacking?

  • If you notice one or more of the above signs, check/check the resources on your computer (processing speed, power consumption)
  • Use browser extensions that block coin mining
  • Use privacy-focused ad blockers
  • Install the latest software updates and patches for your operating system and all applications - especially web browsers etc.

Further information can be found Interpol  website (in English)

source

Police prevention

Also read: Bitcoin scam on Facebook with Elon Musk


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )