{"id":4444,"date":"2021-03-11T10:42:42","date_gmt":"2021-03-11T10:42:42","guid":{"rendered":"https:\/\/paybis.com\/blog\/?p=4444"},"modified":"2023-07-21T14:23:55","modified_gmt":"2023-07-21T14:23:55","slug":"cryptojacking-how-to-protect-yourself-your-computer","status":"publish","type":"post","link":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/","title":{"rendered":"Cryptojacking &#8211; How to Protect Yourself &#038; Your Computer"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cyber crime grows faster than the methods used to prevent it. In the last decade alone, we saw the biggest monetary heists occuring in the digital world, and criminals (a.k.a. hackers) getting away with large sums of money using sensitive personal information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But is data the only thing that can help these culprits make lots of money? Many would argue that there are other ways to benefit, one of which involves using the resources of third-party devices to mine cryptocurrency.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A form of unethical hacking known as cryptojacking saw a sharp increase in the latest bull market of <a href=\"https:\/\/paybis.com\">Bitcoin<\/a>, as well as the one we are cruising right now, targetting mainly large, corporate computer networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But what is cryptojacking exactly? This is exactly what we will be talking about in this article. In the next few chapters you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, how it works, and why it\u2019s rather hard to detect. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s delve in!<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What is cryptojacking?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cryptojacking is a subtle form of hacking that allows cyber criminals to use your computation power in order to mine cryptocurrency. This is done through the installation of a malicious script or software on your computer, laptop, or mobile devices. From the moment you fall victim to cryptohacking, your device will mine cryptocurrency for the hackers leaving you completely unsuspected of anything. By the time you start noticing the issue, you will most likely be faced with very high electricity costs and an overheated computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/paybis.com\/blog\/blockchain-glossary\/\"><span style=\"font-weight: 400;\">crypto term<\/span><\/a><span style=\"font-weight: 400;\"> increased in popularity during 2018, when certain types of software enabled everyday individuals to monetize the computation power of others in a very simple way. There was a second spike in cryptojacking cases in 2020 as well:<\/span><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/CxPyHRzfx2A?start=13\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Types of cryptojacking<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Generally speaking, there are two different types of cryptojacking. These are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>File-based<\/b><span style=\"font-weight: 400;\"> &#8211; This type of cryptojacking enters your corporate network just like any other malware, and many of them are self-propagated. These later spread through the internal network creating huge electricity costs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Browser-based<\/b><span style=\"font-weight: 400;\"> &#8211; This form of cryptojacking doesn\u2019t even need to enter in your (corporate) network. If employees visit certain websites through company-owned devices there is a high amount of risk. Here is how it typically works:\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">First, the attacker identifies and infiltrates a vulnerable website.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The attacker hides malicious crypto jacking code in the site.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The employee logs into the website to benefit from its services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The device of the employee now offers its processing power to the attacker.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">As long as the web browser is open, the attacker benefits from the process.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For both of these methods, the cryptocurrency that is being mined is eventually transferred to the wallet of the attacker, while all the costs associated with mining are stacked upon the monthly bills of the corporation that is \u201chighjacked\u201d.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">How to detect cryptojacking<\/span><\/h2>\n<p><picture class=\"attachment-pinterest\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4447 aligncenter\" src=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking.jpg\" alt=\"How to detect cryptojacking\" width=\"1280\" height=\"853\" srcset=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking.jpg 1280w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking-300x200.jpg 300w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking-1024x682.jpg 1024w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking-150x100.jpg 150w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-detect-cryptojacking-768x512.jpg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fpaybis.com%2Fblog%2Fcryptojacking-how-to-protect-yourself-your-computer%2F&media=https%3A%2F%2Fpaybis.com%2Fblog%2Fwp-content%2Fuploads%2F2021%2F03%2Fhow-detect-cryptojacking.jpg&description=Cryptojacking+-+How+to+Protect+Yourself+%26+Your+Computer\" class=\"pin-it-button\" target=\"_blank\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12.289,2C6.617,2,3.606,5.648,3.606,9.622c0,1.846,1.025,4.146,2.666,4.878c0.25,0.111,0.381,0.063,0.439-0.169 c0.044-0.175,0.267-1.029,0.365-1.428c0.032-0.128,0.017-0.237-0.091-0.362C6.445,11.911,6.01,10.75,6.01,9.668 c0-2.777,2.194-5.464,5.933-5.464c3.23,0,5.49,2.108,5.49,5.122c0,3.407-1.794,5.768-4.13,5.768c-1.291,0-2.257-1.021-1.948-2.277 c0.372-1.495,1.089-3.112,1.089-4.191c0-0.967-0.542-1.775-1.663-1.775c-1.319,0-2.379,1.309-2.379,3.059 c0,1.115,0.394,1.869,0.394,1.869s-1.302,5.279-1.54,6.261c-0.405,1.666,0.053,4.368,0.094,4.604 c0.021,0.126,0.167,0.169,0.25,0.063c0.129-0.165,1.699-2.419,2.142-4.051c0.158-0.59,0.817-2.995,0.817-2.995 c0.43,0.784,1.681,1.446,3.013,1.446c3.963,0,6.822-3.494,6.822-7.833C20.394,5.112,16.849,2,12.289,2\"><\/path><\/svg><\/a><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s rather hard to notice cryptojacking taking place, especially if the ones being affected have no technical knowledge or experience with the issue. There are however certain things you can do in order to understand how to detect cryptojacking:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A decrease in performance or a lag in the execution process<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular overheating of your device(s)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check your CPU usage monitor as you visit different websites<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use antivirus and anti-malware software<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stay up to date with cryptojacking news to understand if any new forms or techniques are developed.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By adhering to all the above practises you will ensure that cryptojacking detection becomes a norm for your organization.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">How to prevent cryptojacking<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To resolve a problem before it occurs you will need to prevent it. And when it comes to cryptojacking this is very important, as it can take a long period of time to notice it taking place. Therefore, here are the different ways you can utilize to bulletproof your device(s):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Educate yourself<\/b><span style=\"font-weight: 400;\"> on the different types of cryptojacking and how these work.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use browser extensions<\/b><span style=\"font-weight: 400;\"> (like <\/span><a href=\"https:\/\/chrome.google.com\/webstore\/detail\/minerblock\/emikbbbebcdfohonlaifafnoanocnebl?hl=en\"><span style=\"font-weight: 400;\">MinerBlock<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/chrome.google.com\/webstore\/detail\/nominer-block-coin-miners\/jfnangjojcioomickmmnfmiadkfhcdmd?hl=en\"><span style=\"font-weight: 400;\">NoCoin<\/span><\/a><span style=\"font-weight: 400;\">) that prevent malware script from being hidden into your device.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use a privacy browser<\/b><span style=\"font-weight: 400;\"> that blocks ads automatically (e.g. <\/span><a href=\"https:\/\/brave.com\/\"><span style=\"font-weight: 400;\">Brave<\/span><\/a><span style=\"font-weight: 400;\"> browser) and avoid downloading extensions you don\u2019t necessarily need.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use common sense<\/b><span style=\"font-weight: 400;\"> &#8211; don\u2019t click on suspicious links and scan your device for viruses on a regular basis.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What if my device is \u201cinfected\u201d already?<\/span><\/h2>\n<p><picture class=\"attachment-pinterest\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4448\" src=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected.png\" alt=\"What if my device is \u201cinfected\u201d already?\" width=\"1280\" height=\"960\" srcset=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected.png 1280w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected-300x225.png 300w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected-1024x768.png 1024w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected-150x113.png 150w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/what-if-my-device-infected-768x576.png 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fpaybis.com%2Fblog%2Fcryptojacking-how-to-protect-yourself-your-computer%2F&media=https%3A%2F%2Fpaybis.com%2Fblog%2Fwp-content%2Fuploads%2F2021%2F03%2Fwhat-if-my-device-infected.png&description=Cryptojacking+-+How+to+Protect+Yourself+%26+Your+Computer\" class=\"pin-it-button\" target=\"_blank\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12.289,2C6.617,2,3.606,5.648,3.606,9.622c0,1.846,1.025,4.146,2.666,4.878c0.25,0.111,0.381,0.063,0.439-0.169 c0.044-0.175,0.267-1.029,0.365-1.428c0.032-0.128,0.017-0.237-0.091-0.362C6.445,11.911,6.01,10.75,6.01,9.668 c0-2.777,2.194-5.464,5.933-5.464c3.23,0,5.49,2.108,5.49,5.122c0,3.407-1.794,5.768-4.13,5.768c-1.291,0-2.257-1.021-1.948-2.277 c0.372-1.495,1.089-3.112,1.089-4.191c0-0.967-0.542-1.775-1.663-1.775c-1.319,0-2.379,1.309-2.379,3.059 c0,1.115,0.394,1.869,0.394,1.869s-1.302,5.279-1.54,6.261c-0.405,1.666,0.053,4.368,0.094,4.604 c0.021,0.126,0.167,0.169,0.25,0.063c0.129-0.165,1.699-2.419,2.142-4.051c0.158-0.59,0.817-2.995,0.817-2.995 c0.43,0.784,1.681,1.446,3.013,1.446c3.963,0,6.822-3.494,6.822-7.833C20.394,5.112,16.849,2,12.289,2\"><\/path><\/svg><\/a><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">If you believe (or discover) that your device has fallen victim to cryptojacking there are a few simple steps you can take to ensure that it returns back to its prior state:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>For file-based cryptojacking<\/b><span style=\"font-weight: 400;\">, you will need to explore which apps or extensions were recently downloaded to your device. Do they all come from reputable sources? If not, they might be the culprit for the issue. If you are using antivirus, the software should easily \u201cpick up\u201d the malware so you can delete it permanently. If your antivirus can\u2019t pick it up but you are certain you have fallen victim to illicit malware it is best to restore your device to its previous point or completely reboot your hard drive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>For browser-based cryptojacking<\/b><span style=\"font-weight: 400;\">, the solution is much easier. You simply needs to close your browser. While this sounds rather self-intuitive, there are many people that never close their browsers due to the many different tabs they need to attend. The same people will often send the computer to \u201csleep\u201d at the end of the workday instead of shutting it down completely. In this case, the culprit could take advantage of the situation.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Reasons behind the significant rise in cryptojacking<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As aforementioned, cryptojacking can be used on both the individual and the corporate level. However, the majority of these efforts are focused on large computer networks of companies. As the number of cases have been growing steadily, we have identified three reasons that explain the motivation for such practises:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The increased value of cryptocurrencies<\/b><span style=\"font-weight: 400;\"> &#8211; Making money is the main reason for cryptojacking. Aside from the industry growing faster than any other, the mined cryptocurrencies are also appreciating in value rapidly, especially when the mining happens over longer periods of time.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Most corporations are not even aware of the risks<\/b><span style=\"font-weight: 400;\"> &#8211; This is because the attackers use the company\u2019s resources instead of its data, or other sensitive information. In the eyes of all involved parties there is no direct threat to the company, and the higher costs can easily be overlooked or labelled as something else.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>It is a \u201csubtle\u201d money-making method <\/b><span style=\"font-weight: 400;\">&#8211; By the time a corporation notices that its computers operate slower than usual, and that their electricity costs are increasing month over month, the attacker will have already made a significant amount of money on the back of the company\u2019s computer network.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another reason we have seen a rapid increase in cryptojacking cases is a software known as CoinHive.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The launch and growth of CoinHive<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In the past couple of years, cryptojacking has become a more serious problem, as we see it <\/span><a href=\"https:\/\/docs.broadcom.com\/doc\/istr-cryptojacking-modern-cash-cow-en\"><span style=\"font-weight: 400;\">grow in popularity<\/span><\/a><span style=\"font-weight: 400;\"> among cyber criminals. Part of the reason behind this spike in cases is a software known as CoinHive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In September 2017, CoinHive was introduced to the public as a way for websites to mine cryptocurrencies through the browsers of their site\u2019s visitors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What made CoinHive more popular than similar types of software that came before is its ability to mine Monero &#8211; a privacy coin. This means that tracing the cryptojacking script back to the cryptojacker was nearly impossible, since the coins cannot be traced.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CoinHive made it easy for webmasters toenable browser-based cryptojacking as an additional source of monetization. And while the software explicitly stated that consent must be acquired before any of these practises takes places, many websites never got to this point.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At its early stages, CoinHive didn\u2019t explicitly enforce its users to inform the visitors of their website. This eventually lead to many webmasters taking advantage of the situation (banking on their traffic) and crypto hacking professions integrating it into their malware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Shortly afterwards, we experienced the massive bull run of 2017, which took the <a href=\"https:\/\/paybis.com\/price\/bitcoin\/\">Bitcoin price<\/a> to nearly $20.000. Naturally, Monero and CoinHive scripts grew as well. In a short period of time they were found in many different locations, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Browser extensions and software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Youtube and Facebook ads.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Advertisement networks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Applications for mobile and desktop devices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automated chatbots<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Websites with massive traffic (.gov and commercial)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">CoinHive took things one step further<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">By August 2018, CoinHive was responsible for <\/span><a href=\"https:\/\/mobile.twitter.com\/bad_packets\/status\/1030201187381927936\"><span style=\"font-weight: 400;\">62%<\/span><\/a><span style=\"font-weight: 400;\"> of all criminal and non-consentual cryptojacking, and the company did not do much to stop its bad reputation from growing. Who would blame them, when finding out that they automatically receive 30% of all Monero mined through their scripts?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This became even more prevalent later on, when the company would invalidate wallets linked with suspicious activity, keeping 100% of the profits made in Monero. Many could argue that CoinHive was and still is one of the biggest cryptojackers of all times, even though they later released an unsuccessful updated version of their product called AuthedMine.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Is CoinHive still available to the public?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As of March 2019 CoinHive <\/span><a href=\"https:\/\/www.theverge.com\/2019\/2\/28\/18244636\/coinhive-cryptojacking-cryptocurrency-mining-shut-down-monero-date\"><span style=\"font-weight: 400;\">no longer offers its services<\/span><\/a><span style=\"font-weight: 400;\"> to the public, after AuthedMine never really took off. For the long-term sustainability and reputation of the industry this is really good news. However, some webmasters claim that it removed an important part of their monetization strategy that they now need to find other ways to cover.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Do cryptocurrencies empower such practises?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For many cyber criminals, the growth of cryptocurrencies as alternative payment methods has been blessing in terms of privacy and ease of distribution. Where, in the past, it would be rather hard for hackers to get away with large amounts of money, nowadays it becomes increasingly easier by using certain cryptocurrencies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aside from being hard to track, cryptojacking is also very profitable:<\/span><\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">It\u2019s not everyday that you see how profitable a <a href=\"https:\/\/twitter.com\/hashtag\/cryptojacking?src=hash&amp;ref_src=twsrc%5Etfw\">#cryptojacking<\/a> campaign can be for the attacker including access to the wallets and how much they earned<a href=\"https:\/\/t.co\/9eKLL0E3PD\">https:\/\/t.co\/9eKLL0E3PD<\/a><\/p>\n<p>\u2014 ezoren (@ezoren3) <a href=\"https:\/\/twitter.com\/ezoren3\/status\/1349378113243934721?ref_src=twsrc%5Etfw\">January 13, 2021<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">That is not to say that all cryptocurrencies are untraceable &#8211; there is a reason CoinHive chose use Monero as its mining preference. Most cryptocurrencies offer \u201cpseudo-anonymity\u201d, meaning that blockchain lurkers can see the addresses participating in a transaction but not the individuals behind them. However, since the rise of KYC-mandated wallets (whitelisting practises), it has been increasingly easier to identify users by following the transactions made with their funds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All in all, it is the privacy coins, like ZEC and Monero, that are able to accommodate such practises, allowing users to get away with it. It is impossible to track the transactions on a public blockchain, which in turn makes it a \u201csafe haven\u201d for cryptojackers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Wrapping up<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If you made it this far, you should now be aware of one more \u201cshady\u201d attempts cyber criminals use to benefit from you. While this method is not directly linked with hacking or data breaches, it can drain both the electricity of your devices and the contents of your wallet (when its time to pay the bills).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Knowing this, you should follow the practises discussed above when it comes to detecting and preventing cryptojacking from taking place. You can always use your computational power to mine cryptocurrencies for your own accord, but be fully aware of the costs that are linked to it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To summarize the contents of this article, here are the things we talked about:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The definition of cryptojacking<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The different types (file-based vs browser-based)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How to detect and prevent cryptojacking<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Steps to take if your device is already infected<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The reasons behind the spike in cryptojacking cases<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The role of CoinHive in the growth of such cases<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Therefore, and in case you ever feel like your device may have fallen victim to such practises, it may be a good idea to bookmark this article for future reference.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber crime grows faster than the methods used to prevent it. In the last decade alone, we saw the biggest monetary heists occuring in the digital world, and criminals (a.k.a. hackers) getting away with large sums of money using sensitive personal information. But is data the only thing that can help these culprits make lots [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4450,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8,50,132,195],"tags":[199,201,221],"businesses_tag":[],"class_list":["post-4444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-educational-guides","category-general-discussion","category-individuals","category-security-privacy","tag-education","tag-security","tag-mining"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is cryptojacking? How to detect and prevent it - Paybis Blog<\/title>\n<meta name=\"description\" content=\"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cryptojacking? How to detect and prevent it - Paybis Blog\" \/>\n<meta property=\"og:description\" content=\"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"Paybis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Paybis\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-11T10:42:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-21T14:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"372\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dimitris Tsapis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@paybis_com\" \/>\n<meta name=\"twitter:site\" content=\"@paybis_com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dimitris Tsapis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\"},\"author\":{\"name\":\"Dimitris Tsapis\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/person\/794a3eeb6f3aa51e5690cbc4dc56a6b2\"},\"headline\":\"Cryptojacking &#8211; How to Protect Yourself &#038; Your Computer\",\"datePublished\":\"2021-03-11T10:42:42+00:00\",\"dateModified\":\"2023-07-21T14:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\"},\"wordCount\":1986,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/paybis.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png\",\"keywords\":[\"Education\",\"Security\",\"Mining\"],\"articleSection\":[\"Educational guides\",\"General Discussion\",\"Individuals\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\",\"url\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\",\"name\":\"What is cryptojacking? How to detect and prevent it - Paybis Blog\",\"isPartOf\":{\"@id\":\"https:\/\/paybis.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png\",\"datePublished\":\"2021-03-11T10:42:42+00:00\",\"dateModified\":\"2023-07-21T14:23:55+00:00\",\"description\":\"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.\",\"breadcrumb\":{\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png\",\"width\":372,\"height\":372,\"caption\":\"How to prevent your money from cryptojacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/paybis.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Individuals\",\"item\":\"https:\/\/paybis.com\/blog\/category\/individuals\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Educational guides\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/paybis.com\/blog\/#website\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"name\":\"Paybis Blog\",\"description\":\"A Tribute to Blockchain Tech and Cryptocurrency Adoption\",\"publisher\":{\"@id\":\"https:\/\/paybis.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/paybis.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/paybis.com\/blog\/#organization\",\"name\":\"Paybis Blog\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"width\":268,\"height\":72,\"caption\":\"Paybis Blog\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Paybis\/\",\"https:\/\/x.com\/paybis_com\",\"https:\/\/www.instagram.com\/paybis\/\",\"https:\/\/www.linkedin.com\/company\/paybis-com\",\"https:\/\/www.youtube.com\/c\/Paybis\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/person\/794a3eeb6f3aa51e5690cbc4dc56a6b2\",\"name\":\"Dimitris Tsapis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b611944bcd35338a7031aa087e2743da329def18e6461c109d30d4e5f252c35?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b611944bcd35338a7031aa087e2743da329def18e6461c109d30d4e5f252c35?s=96&d=retro&r=g\",\"caption\":\"Dimitris Tsapis\"},\"description\":\"Dimitris is a cryptocurrency analyst specializing in altcoin price predictions, blockchain project analysis, and investment strategies. He focuses on crypto projects, DeFi opportunities, and practical guides for bull markets and discovering early-stage investment opportunities in the digital asset space.\",\"url\":\"https:\/\/paybis.com\/blog\/author\/dimitris\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is cryptojacking? How to detect and prevent it - Paybis Blog","description":"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"What is cryptojacking? How to detect and prevent it - Paybis Blog","og_description":"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.","og_url":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/","og_site_name":"Paybis Blog","article_publisher":"https:\/\/www.facebook.com\/Paybis\/","article_published_time":"2021-03-11T10:42:42+00:00","article_modified_time":"2023-07-21T14:23:55+00:00","og_image":[{"width":372,"height":372,"url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png","type":"image\/png"}],"author":"Dimitris Tsapis","twitter_card":"summary_large_image","twitter_creator":"@paybis_com","twitter_site":"@paybis_com","twitter_misc":{"Written by":"Dimitris Tsapis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#article","isPartOf":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/"},"author":{"name":"Dimitris Tsapis","@id":"https:\/\/paybis.com\/blog\/#\/schema\/person\/794a3eeb6f3aa51e5690cbc4dc56a6b2"},"headline":"Cryptojacking &#8211; How to Protect Yourself &#038; Your Computer","datePublished":"2021-03-11T10:42:42+00:00","dateModified":"2023-07-21T14:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/"},"wordCount":1986,"commentCount":1,"publisher":{"@id":"https:\/\/paybis.com\/blog\/#organization"},"image":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png","keywords":["Education","Security","Mining"],"articleSection":["Educational guides","General Discussion","Individuals","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/","url":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/","name":"What is cryptojacking? How to detect and prevent it - Paybis Blog","isPartOf":{"@id":"https:\/\/paybis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage"},"image":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png","datePublished":"2021-03-11T10:42:42+00:00","dateModified":"2023-07-21T14:23:55+00:00","description":"What is cryptojacking exactly? In this article you will get a detailed introduction to the most \u201cstealthy\u201d form of cybercrime, what is it, how it works, and why it\u2019s rather hard to detect.","breadcrumb":{"@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#primaryimage","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2021\/03\/how-to-prevent-cryptojaking.png","width":372,"height":372,"caption":"How to prevent your money from cryptojacking"},{"@type":"BreadcrumbList","@id":"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paybis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Individuals","item":"https:\/\/paybis.com\/blog\/category\/individuals\/"},{"@type":"ListItem","position":3,"name":"Educational guides"}]},{"@type":"WebSite","@id":"https:\/\/paybis.com\/blog\/#website","url":"https:\/\/paybis.com\/blog\/","name":"Paybis Blog","description":"A Tribute to Blockchain Tech and Cryptocurrency Adoption","publisher":{"@id":"https:\/\/paybis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paybis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/paybis.com\/blog\/#organization","name":"Paybis Blog","url":"https:\/\/paybis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","width":268,"height":72,"caption":"Paybis Blog"},"image":{"@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Paybis\/","https:\/\/x.com\/paybis_com","https:\/\/www.instagram.com\/paybis\/","https:\/\/www.linkedin.com\/company\/paybis-com","https:\/\/www.youtube.com\/c\/Paybis"]},{"@type":"Person","@id":"https:\/\/paybis.com\/blog\/#\/schema\/person\/794a3eeb6f3aa51e5690cbc4dc56a6b2","name":"Dimitris Tsapis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b611944bcd35338a7031aa087e2743da329def18e6461c109d30d4e5f252c35?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b611944bcd35338a7031aa087e2743da329def18e6461c109d30d4e5f252c35?s=96&d=retro&r=g","caption":"Dimitris Tsapis"},"description":"Dimitris is a cryptocurrency analyst specializing in altcoin price predictions, blockchain project analysis, and investment strategies. He focuses on crypto projects, DeFi opportunities, and practical guides for bull markets and discovering early-stage investment opportunities in the digital asset space.","url":"https:\/\/paybis.com\/blog\/author\/dimitris\/"}]}},"_links":{"self":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/posts\/4444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/comments?post=4444"}],"version-history":[{"count":0,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/posts\/4444\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/media\/4450"}],"wp:attachment":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/media?parent=4444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/categories?post=4444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/tags?post=4444"},{"taxonomy":"businesses_tag","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/businesses_tag?post=4444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}