Cryptojacking is the unauthorised use of computer or a mobile device by cybercriminals to mine for cryptocurrency.
Download and share the infographic for free with employees.
How does cryptojacking work?
- Cybercriminals compromise devices by embedding cryptomining/cryptojacking code into email links or websites.
- Unsuspecting users run cryptojacking script on their device.
- After being executed, the cryptomining script runs in the background, without the users’ knowledge.
- Hijacked resources are used to solve complex algorithms and anonymously mine cryptocurrencies.
We recommend the following to stay safe from cryptojacking:
- Never click on links or open attachments received in emails from untrusted sources.
- Ensure the authenticity of a website before proceeding.
- Use ad-blocking or anti-cryptomining extensions on web browsers.
- Ensure that your web filtering tools are up to date.