Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    The Core Issue: Consensus Cleanup

    March 6, 2026

    Canada launches new multi-crypto ETF as banks enter the sector

    March 6, 2026

    Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

    March 6, 2026

    Bitcoin Primed for Rally Through March if History Repeats, According to Benjamin Cowen – But There’s a Catch

    March 5, 2026

    Top Analyst Reveals What’s Next For Bitcoin, Ethereum and XRP

    March 5, 2026

    Ethereum Price Analysis: Institutional Buying Returns as Whales Accumulate

    March 5, 2026

    Ethereum Hovers at $2,150 — Can ETH Price Rally to $2,400 or Stall Below $2,200?

    March 5, 2026

    Vitalik Buterin Admits Ethereum Hasn’t Meaningfully Improved People’s Lives

    March 5, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    Bitcoin Liquidity Set To Expand With Morgan Stanley BTC ETF Option

    March 6, 2026

    Bitcoin Suppressed By Shadow Banking Rehypothecation: Saylor

    March 5, 2026

    XRP Price Retests Decade-Old Trendline That Previously Triggered 630%+ Rallies

    March 5, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    US Ranks #1 in CoinGecko Global Meme Coin Interest Report

    December 18, 2025

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    Startale App Integrates Kyo Finance to Power Seamless Swaps on Soneium

    March 6, 2026

    ICB Network and Mokoko AI Entail Strategic Partnership to Transform Web3 Gaming Infrastructure

    March 6, 2026

    Atlasbrary and Flux Partner to Boost Scalable Web3

    March 5, 2026

    Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

    March 4, 2026

    DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

    March 3, 2026

    Aeternum Botnet Shifts Command Control to Polygon Blockchain

    February 27, 2026

    Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

    February 26, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Web 3
    1. Gaming
    2. View All

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    March 6, 2026

    AurumX Collaborates with FishWar to Redefine Web3-Based Gaming Economies

    March 5, 2026

    C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

    March 4, 2026

    NFTs as Programmable Ownership Layers | Web3 Infrastructure Explained

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Reform UK tops donations with millions from Thailand-based crypto investor: Report

    March 6, 2026

    Donald Trump’s crypto legacy in two words: Paul Atkins

    March 6, 2026

    International finance watchdog warns stablecoins are increasingly used in sanctions evasion and money laundering

    March 5, 2026

    XRP and XRPL get a credibility lift from Ripple’s expanding footprint

    March 5, 2026

    XRP rewrites the playbook for altcoin ETF approvals to surge in late 2026 after a wave of futures listings

    March 4, 2026

    Bitcoin ETF custody concentrates power in one place, and now a single operational failure causes dangerous ripples

    March 3, 2026

    Revolut’s stablecoin test targets its 12M UK users

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Analysis

    XRP Price Consolidates Under $1.5 — What Could Drive the Next Move to $2?

    March 5, 2026

    Israel’s weekly $3B Iran war cost equals over 41,000 Bitcoin

    March 5, 2026

    Chainlink Price Gains Attention After Visa e-HKD Pilot and LINK Chart Signals Possible Breakout

    March 5, 2026

    Can the Bulls Push the Price to $1.16 as $1 Resistance is Back in Focus

    March 5, 2026

    Bitcoin investors may not need altcoins to diversify if tokenized stocks move on-chain

    March 5, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    What Is Farcaster? The Decentralized Social Media Protocol

    February 10, 2026

    What Is Venice AI? The Privacy-Focused Chatbot

    January 13, 2026

    Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

    March 6, 2026

    The company holding all Bitcoin ETF coins is losing money, resurfacing questions about centralization

    February 21, 2026

    The Bitcoin CME gap will now close forever in May leaving a return to $84k hanging

    February 21, 2026

    Robinhood’s $221 million crypto revenue drop shows crypto winter isn’t on chain and retail already moved

    February 16, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Crypto Jacking: What’s New in the World of Resource Hijacking?
Crypto Jacking: What’s New in the World of Resource Hijacking?
Security and Privacy

Crypto Jacking: What’s New in the World of Resource Hijacking?

October 24, 2025No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Phil Muncaster discovers that a combination of surging crypto prices and the pandemic have given cyber-criminals a shot in the arm…

There was a time a few years ago when cryptojacking supplanted ransomware as the pre-eminent global cyber-threat. As detections of the latter slumped in 2018, incidents involving cryptocurrency mining malware surged on the back of a thriving digital currency market. Many commentators claimed this was a sign of things to come. Cryptojacking is easier to make money from because threat actors don’t need to extract payment directly from their victims – they simply add more compromised machines to ramp up mining capability. Or so the argument went.

Then came ransomware-as-a-service, affiliate groups and double extortion – driving a renaissance in ransomware that saw attacks soar 485% in 2020, as home workers and remote access infrastructure were remorselessly targeted during the pandemic. Yet cryptojacking never went away. In fact, it evolved in the intervening years to become something arguably even more prolific. So the question is, should CISOs really care if the only apparent impacts are higher energy bills and slightly slower servers?

Stealing Compute Power

Cryptojacking, on the face of it, has always seemed a lower-level threat than the likes of data breaches, banking Trojans, DDoS and of course, ransomware. At a very high level, it involves the unauthorized use of a victim’s computing power to mine for cryptocurrency in order to generate profits. A variety of coin mining malware has been designed to achieve these ends. Enterprise targets offer arguably the richest pickings in terms of processing and memory resources, although campaigns have been known to go for large numbers of lower-powered smart devices conscripted into coin mining botnets.

One thing is clear: it’s still a popular way to make money. CrowdStrike’s recent OverWatch report recorded a 100% year-on-year increase in detections of cryptojacking intrusions, which it puts down to a sharp rise in the value of digital currencies from late 2020. Skybox Security claims to have seen double the volume of cryptojacking malware in the first half of 2021 versus the previous year. Monero remains the most popular currency to target, as the mining requirements are much lower than those for Bitcoin and there’s no tracking of transactions.

See also  SEC greenlights new generic standards to expedite crypto ETP listings

What’s Changed Since 2018?

To an extent, the same techniques are being used to get coin-mining code onto victim systems today as they were when Infosecurity reported on cryptojacking three years ago. That means scripts embedded into web pages that automatically execute when users visit, or phishing tactics designed to trick users into installing the malware directly on their machines.

However, some actors are going to more extraordinary lengths to stay hidden, according to Nathaniel Quist, senior threat researcher at Palo Alto Networks’ Unit 42.

“Cryptojacking groups vary in sophistication and capability. Some groups, like those behind campaigns such as dbused, avalonsaber and opsec_x12 appear to use copied, stolen or patched-together code, which lends their operations to being easier to detect and prevent. Others such as TeamTNT, Lemon_Duck and WatchDog have elevated their cryptojacking operations to include near zero day, or 1-day, attacks against cloud infrastructure,” he explains to Infosecurity. 

“Cryptojacking groups vary in sophistication and capability”

“Lemon Duck has begun targeting cloud Microsoft Server instances that are vulnerable to ProxyLogon. WatchDog has included 32 unique remote code execution exploits within its cryptojacking malware, and TeamTNT has developed some of the first Kubernetes lateral movement attacks designed specifically to increase their mining operations. Each of these groups is considered to be technically proficient and a persistent threat.”

The pandemic has also unintentionally benefited cryptojackers. Although remote and hybrid workers aren’t being targeted directly, as enterprise resources offer more bang for the buck, the growing public cloud infrastructure needed to support them is targeted directly.

“The growing use of public cloud infrastructure as more users work remotely not only expands the attack surface of devices, but it also increases the management complexity and risk from shared cloud services,” CrowdStrike threat expert Scott Taschler tells Infosecurity.

“They’re facing new kinds of cyber-attacks. They’re accessing data and apps in the cloud, often from personal devices. They may not be protected by the security controls you’ve deployed across your network. Adversaries are looking to take advantage of any human error and misconfigurations from devices, and all lapses in IT hygiene increase the risk that a determined attacker will find a way to gain access.”

See also  Senate Democrats, Crypto Reps Resume Talks After Bill Delay

Unit 42’s Quist agrees that cloud environments have been the subject of mounting cryptojacking activity in recent months.

“We saw a rise in security incidents across nearly all industry verticals with retail, manufacturing and government leading the rest. This is significant as these three industries also saw the largest increase in the creation of cloud workloads during the same time, April to June 2021,” he argues.

Lisa Short, a professor at London Graduate School and co-founder of P&L Digital Edge, argues that SMEs may be particularly at risk today.

“Widespread use of third-party JavaScript is making it easier for cyber-criminals to infiltrate websites with client-side attacks. They are particularly effective at exploiting non-technical SME websites, often self-built with low security and snippets of code copy-and-pasted into editing software,” she tells Infosecurity.

“Obviously, the move to remote working and vertiginous rise in digital transformation by the 99% of the economy which are small businesses, has exposed a new vulnerability for exploitation by these hackers and cyber-criminals.”

Hitting Back and Shifting Left

Security experts have long sought to raise awareness about the potentially severe repercussions of a cryptojacking infection. Yes, the bad guys are ultimately ‘only’ stealing your compute power, and yes, there’s a relatively minimal regulatory risk from being compromised. However, there’s a genuine risk that an attacker may not stop there. With possible access to your networked machines, what’s to prevent them monetizing one step further by deploying ransomware or info-stealing malware, for example? As such, organizations should get a handle on mitigation. The good news is that well-understood industry best practices will go a long way to diffusing the threat.

See also  Accomplice pleads guilty in violent abduction of Ontario’s ‘Crypto King’

“Security teams must be able to identify an event and understand the attack vector, they must be able to stop an active breach and remediate systems quickly and they must learn from an attack and close security gaps”

“Security teams must be able to identify an event and understand the attack vector, they must be able to stop an active breach and remediate systems quickly and they must learn from an attack and close security gaps,” says CrowdStrike’s Taschler.

“As ever, organizations must always practice strong security hygiene: regularly patching vulnerable apps and operating systems, and protecting privileged user accounts. They need an endpoint protection platform so that they are able to prevent and detect all threats, including known and unknown malware, as well as identifying in-memory attacks.”

For Unit 42’s Quist, cloud-based next-gen firewalls are a great place to start to help detect malicious network traffic and malware targeting cloud environments. Nevertheless, organizations should also adopt and enforce industry standards such as CIS benchmarks, and more fundamentally, adopt a ‘shift-left’ security mindset, he adds.

“Embed cloud security directly into your code reviews and development pipeline by scanning for vulnerabilities and misconfigurations,” Quist argues. “The earlier development teams can find and remove security risks from their cloud architecture, the more secure the final production architecture will be.”

For Short, the very nature of cryptocurrencies may aid the work of investigators.

“We don’t talk enough about transparency and the evidentiary asset trails that blockchain affords to protect business assets rather than just to store and transfer value,” she concludes. “Bear in mind that all digital assets, not just crypto, have an evidentiary trail on a blockchain, so capturing the criminals and recovering assets is much easier.”

Crypto Hijacking Jacking Resource whats World
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Reform UK tops donations with millions from Thailand-based crypto investor: Report

March 6, 2026

Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

March 6, 2026

Donald Trump’s crypto legacy in two words: Paul Atkins

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Exchanges Urge SEC to Curb Broad Crypto Exemptions, Warn on Tokenized Stock Risks

November 28, 2025

Cops Raid Suspected Fraudster Penthouses

October 14, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.