Build Your Defense Against Cryptojacking, an Increasing Threat

Security Tips to Protect Against Cryptojacking
Almi Dumi, eMazzanti Technologies InfoSec Team

The first cryptocurrency emerged in 2009 as Bitcoin. Over the past nine years, Bitcoin and other digital currencies have gradually cemented a place on the financial playing field. While the currency has attracted attention for its growth potential and anonymity, it also opens the door to new security threats in the form of cryptojacking.

The term “cryptocurrency” combines the words cryptography and currency. And in fact, the money is based on complicated mathematical encryption. Surprisingly, the “coins” only exist as lines of code in a centralized database, or digital ledger. Remarkably, once worth only pennies, a single bitcoin is currently valued at over $6000.

Mining for Cryptocurrency

As cryptocurrency has increased exponentially in value, it has become highly desirable. There are two ways to obtain cryptocurrency. The most straightforward, and expensive, method is to buy bitcoins (or other rival currencies) on a centralized exchange such as Coinbase.

More often, individuals earn cryptocurrency through a process called mining. Miners solve the complex mathematical equations used to verify digital transactions and release new cryptocoins into circulation. In return, they are rewarded with cryptocurrency.

Over time, the complexity of the equations has increased, requiring more and more processing power. A single high-end computer might take years to solve the equations that result in a cryptocoin. But, with an array of computers, a miner can turn a profit. Enter cryptojacking.

Cryptojacking: An Increasing Threat

Why buy a farm of computers and the electricity to run them when you can simply borrow the processing power from unsuspecting victims? For this reason, unscrupulous cryptominers have turned to hijacking computers, networks and even mobile devices to use the processing power to earn cryptocoins.

Alarmingly, in December 2017, cryptominers affected 55 percent of businesses across the world. And in a single quarter of this year, 2.5 million new occurrences of cryptojacking software were identified.

There are two approaches to cryptojacking:

  • Infecting an unsuspecting device with cryptomining code – This method works like classic malware. The user clicks a malicious link that downloads cryptomining code. Then, the mining process runs in the background, visible to the victim only as a drain on processing power.
  • In-browser mining – This method embeds lines of JavaScript code onto a web page. While a user is visiting the web page, the code accesses the processing power of the visitor’s device.

Unlike ransomware, with cryptojacking, you can be a victim and not even be aware that a bad actor has taken over your device’s processing power. The most tell-tale signs are increased CPU usage, an overheated device and higher electrical bills. For an organization, this can significantly drain both resources and budget.

Multi-faceted Defense

As the threat from cryptojacking grows, individuals and businesses need to ramp up security measures. Educate your users (again) on safe computing. Never click suspicious links and avoid downloading files from unknown sources. In addition, make sure your antivirus software looks for cryptomining and keep it up-to-date.

Adblock includes options to block cryptomining scripts, and popular browsers now offer extensions to guard against mining. These measures provide some protection, but for organizations, a more comprehensive approach is needed.

If you suspect your business has been affected by cryptojacking, or if you want to prevent the problem before it occurs, reach out to eMazzanti. Our cyber-security experts will conduct an assessment to determine the existence of cryptomining code on your devices or even on your web site.

After an initial assessment, our team will help you implement next generation protocols and  multi-layer security to guard against future attack. We will monitor your network 24/7 for threats, giving you the peace of mind you need to focus on your business.

Almi Dumi is the Chief Information Security Officer at eMazzanti Technologies. Leading a highly skilled cyber-security team, Dumi has been with eMazzanti for over eleven years. He holds numerous professional certifications and is dedicated to providing the highest quality cyber-security technology to protect customers’ valuable business assets.

Download Article PDF

Cloud Services New York City

Recent Posts

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations…

4 years ago

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found…

4 years ago

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365),…

4 years ago

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded…

4 years ago

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges.…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential…

4 years ago