What is Cryptojacking? Definition, Detection & Prevention

Header

Author: Trend Micro

August 31, 2021

This article is from Trend Micro.

Bitcoin, the world’s biggest and most well-known cryptocurrency, is up more than 70% from this year’s low of $27,734 on January 4. The price rally of Bitcoin has also pulled up the value of other popular cryptocurrencies like Ethereum ($ETH), Binance Coin ($BNB), Ripple ($XRP), and Monero ($XMR).

The exponential growth of the cryptocurrency market has attracted not just legitimate investors, but has also presented an option for threat actors to generate revenue through cryptojacking.

What is cryptojacking?

Cryptojacking involves the installation of malware on a device from a malicious source in order to hijack computing power to secretly mine cryptocurrencies (often Monero $XMR), without the user’s knowledge or consent.

This usually happens when a victim clicks on an unknown link in an email or visits a compromised website containing a malicious script. These scripts provide cybercriminals the authority to access the victim’s computer and other devices connected to the Internet. Some mining programs unwittingly load in the background without any prompt or notification, leaving the victim unaware that their computer now has coin miners installed which are generating cryptocurrency.

Early cryptojacking attempts largely targeted PCs and mobile devices running browsers via the cryptomining software from Coinhive. Coinhive developed this software ostensibly for on-the-level web companies to better monetize their sites, but criminals soon capitalized on it for illicit purposes. A cat-and-mouse game soon followed, as antivirus vendors listed Coinhive as malware, which then drove innovation in cryptojacking software that would go on to defeat anti-malware tools.

Why cryptojacking is a concern

Cryptojacking is now the most popular and prevalent cyberthreat, displacing ransomware attacks. The primary impact of cryptojacking is on a computer’s performance as it consumes processor cycles leaving the machine running abnormally slow. It also increases the cost of your electricity bill because cryptocurrency mining requires a large amount of computing power, and attackers run it continuously so they can earn more.

Although the effects of cryptojacking may seem harmless, users should still be wary. Any cyberthreat that uses your computer’s resources should be a concern because it affects your business and productivity.

Signs you could be a victim of cryptojacking

Cryptojacking can be hard to detect, but here are a few signs that your machine may be infected:

  • A noticeable slowdown in device performance
  • An overheating battery
  • Restarting or shutting down due to a lack of available processing power
  • Unexpected increases in electricity costs

Prevention tips

Because cryptojacking attacks use very similar techniques to conventional types of cybercrimes, the methods to protect against them should already be very familiar to you.

Here are some tips to detect and prevent cryptojacking:
1. Continuously monitor resources on your computer such as processing speed and power usage. Installing a performance monitoring app that visualizes the CPU, network, and memory usage of your computer will be very beneficial. Use Trend Micro Cleaner One Pro to help you monitor your computer’s performance.

2. Install the latest software updates and patches for your operating system and all applications, especially those that address known web browser vulnerabilities and exploits.

3. Install an antivirus app that blocks web threats and malicious ads – which are a common source of embedded cryptojacking scripts. Look for a trusted one that provides defense against online dangers including coin mining software. Use Trend Micro Maximum Security to provide smart protection for all your devices.

Click the button below to give it a try:

Report a Scam!

Have you fallen for a hoax, bought a fake product? Report the site and warn others!

Help & Info

Top Safety Picks

Your Go-To Tools for Online Safety
Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.

  1. ScamAdviser App - iOS : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS
  2. ScamAdviser App - Android : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android.
  3. NordVPN : NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!
  4. Incogni : Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!

Popular Stories

As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu

How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction