What is Cryptojacking?

Sdílet
Vložit
  • čas přidán 8. 09. 2024
  • We’ve all heard of crypto but what about cryptojacking? In this video we’re going to look at what cryptojacking is and what you can do to protect yourself from it. Please do subscribe if you haven’t already, it really helps this small channel grow.
    To understand what crypto jacking is, we first need understand how crpyto currenency mining works. Crypto is mined by using computers to solve complex mathematical problems, which validate and add transactions to the blockchain. This process, called proof of work, requires significant computational power. Miners are rewarded with newly created cryptocurrency coins for their efforts in securing the network and processing transactions. Mining is particularly intensive on a devices cpu and gpu. In short the more computing power you have, the more crpyto you can mine and the more money you make.
    Cryptojacking is when attackers infect a victim's computer with malware that installs a cryptocurrency miner. This malware can be distributed via phishing emails, malicious downloads, or exploiting vulnerabilities in software. The user is often unaware their device is being used to mine crypto for someone else as they don’t realise the malware has been installed. Its not just limited to malware you accidentally instal though, attackers can embed JavaScript code into websites, which runs on visitors' browsers. When someone visits an infected site, the attackers script uses their devices resources to mine cryptocurrency. Its not just induvial users that are targeted for cryptojacking. Elon musks tesla fell victim to it in 2018 when its Amazon Web Services cloud infrastructure was found to be running mining malware.
    So what impact would it have on you if your device was being used for crypto mining.
    Performance Degradation would likely occur as cryptojacking significantly slows down the affected devices due to high CPU usage. This can cause overheating, reduced battery life in laptops and mobile devices, and an overall decrease in system performance.
    Increased Energy Consumption is also possible. The excessive use of processing power leads to higher electricity bills, as the device consumes more power while mining crypto.
    Hardware Damage is another risk. Continuous high CPU usage can cause hardware components to wear out faster, potentially leading to system failures or reduced lifespan of the device.
    So how would you know if your device has been crypto jacked and what can you do? Unusual spikes in CPU or GPU usage can indicate cryptojacking. Tools and utilities such as task manager in windows monitor system performance and can help detect any spikes In usage.
    Using antivirus and anti-malware programs can help detect and remove cryptojacking malware. Many security solutions now include features specifically designed to combat cryptojacking. Defender which comes as part of windows is perfectly adequate.
    Some browser extensions can block cryptojacking scripts from running if you visit an infected website. I personally use MinerBlock in google chrome which is a free extension.
    Keeping software and systems up to date can also help protect against vulnerabilities that cryptojackers might exploit. Companies such as Microsoft are fast tp push out a patch if a vulnerability is detected In windows as are other software providers. Try to update asap whenever a new patch is released. What do you think should be done to manage the risk of cryptojacking? Let me know down in the comments and please do subscribe if you’ve enjoyed this video and thanks for watching!
    #cryptojacking #crypto #cybersecurity

Komentáře • 3

  • @techindex1
    @techindex1  Před 2 měsíci +4

    What do you think should be done to manage the risk of crypto jacking?

  • @mathiastoala7777
    @mathiastoala7777 Před 2 měsíci +2

    Great informative video! 🗣️