Cryptomining attackers use corporate infrastructure to mine cryptocurrency. They drain resources and increase operational costs, and are a sign of dangerous security gaps. Here’s what defenders need to know.
A cryptomining attack, often referred to as cryptojacking, refers to the unauthorized use of computing resources to mine cryptocurrency. Unlike traditional cyberattacks that seek to steal sensitive data or launch ransomware, the primary goal of a cryptomining attack is to generate cryptocurrency profits for the attacker.
A cryptomining attack occurs when an attacker installs malware — also known as a cryptojacking script — on a victim's machine, which then harnesses the CPU, GPU, or other computational resources to mine cryptocurrencies like Bitcoin, Monero, or Ethereum. This allows the attacker to conduct seemingly legitimate cryptomining activities: Cryptocurrencies leverage databases called blockchains consisting of "blocks" of recent transactions that are frequently updated using a complex mathematical process. Producing new blocks requires computing power, which individual “minors” exchange for small amounts of currency. Cryptojacking allows attackers to do this at scale.
Attackers sometimes use phishing emails or compromised software updates to install cryptomining malware on laptops or even mobile devices — though phones have less processing power, infecting a lot of them at once makes it worthwhile.
In many instances, cryptojacking scripts are deployed through web browsers or online ads. Attackers also use browser-based cryptojacking to inject malicious JavaScript code into websites. When someone visits an infected site, the script begins mining cryptocurrency using the visitors' devices without their consent. This type of cryptojacking doesn't require malware installation and stops once the user leaves the site.
Attackers use cryptomining—specifically illicit cryptomining or "cryptojacking"—to generate financial gain by harnessing the processing power of compromised systems without the owners' consent. By infecting computers, servers, or even Internet of Things (IoT) devices with cryptomining malware, attackers can mine cryptocurrencies like Bitcoin or Monero, profiting from the victims' resources. Here are the primary reasons why attackers engage in cryptomining:
Cryptomining attacks can be difficult to detect since they’re designed to stay hidden. But there are ways to watch for it, such as paying attention to device lags and increases in CPU usage. However, this observational approach requires reliance on employees to report performance issues — if they even notice them in the first place. A more reliable method is to use AI and machine learning.
Vectra AI has built AI-driven detections designed to find attacks based on their behaviors. This includes a cryptocurrency mining detection focused on identifying unauthorized use of an organization's computing resources to mine cryptocurrencies.